1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lisa [10]
2 years ago
8

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will

be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
Computers and Technology
1 answer:
Tresset [83]2 years ago
5 0
Answer: star

Explanation: A star network topology is an implementation of a spoke–hub distribution paradigm in computer networks. In a star network, every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to transmit messages. The star network is one of the most common computer network topologies.
You might be interested in
When a defendant pleads guilty to one offense just to have another offense dropped, this is what type of plea bargain
uranmaximum [27]
<h2>Answer:</h2>

The answer is sentenced plea bargain

<h2>Explanation:</h2>

sentence bargaining occurs when a defendant agrees to plead guilty to the stated charge in return for a lighter sentence. Typically this must be reviewed by a judge, and many jurisdictions simply don't allow it. In sentence bargaining, they plead guilty agreeing in advance what sentence will be given; however, this sentence can still be denied by the judge.

4 0
3 years ago
Read 2 more answers
In your own words, describe how a network administrator can use the OSI model to isolate a network problem.
fenix001 [56]

Answer:

 Network administrator use the open system interconnection model to isolate the network problem as, the network administrator can easily find the problem in the system.

Network administrator regularly depicts issues by the layer number and in many cases the network problem required the network administrator to isolate the issue in which layer the maximum number of issue occurred.

By using the OSI layer, we can easily add protocols to its higher to lower layers without any type of interruption.

3 0
3 years ago
Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permi
True [87]

Answer:

Robocopy

Explanation:

The newer and most used command to accomplish this is Robocopy. This code does exactly what is described in the question, it copies the entire structure of the volume in question but still maintains all of its permissions and attributes. It also allows you to copy large datasets at an extremely fast speed, roughly 150 MB/sec. Robocopy can even resume interrupted file transfers without loss of data.

8 0
2 years ago
If you see an icon in a document preset that looks like a tiny web browser window, what type of document is the preset meant to
MatroZZZ [7]

Answer:

I think it's D.

Explanation:

As I think that it is an hyperlink button which links to a word or sentence with a website

6 0
3 years ago
Why is it a best practice of a remote access policy definition to require employees and users to fill in a separate VPN remote a
Anna007 [38]

Answer:

a.This helps with non-repudiation to ensure the user is who they claim to be and that they are authorized to access confidential organizational assets.

Explanation:

8 0
3 years ago
Other questions:
  • What type of devices are the key board and the mouse?
    10·1 answer
  • The factorial of an integer N is the product of the integers between 1 and N, inclusive. Write a while loop that computes the fa
    10·1 answer
  • You can write as many constructors for a class as you want, as long as they all have different ____ lists.
    8·1 answer
  • You have created a new dhcp scope with address range 192.168.1.1 to 192.168.1.254. you have five servers configured with static
    9·1 answer
  • Importance of producing a hardcopy output​
    15·1 answer
  • Cuales son las funcione basica de la computadora​
    9·1 answer
  • What are the benefits of writing functions that use parameters and return? Try to list at least two.
    12·1 answer
  • How should tools be stored <br>​
    13·1 answer
  • Which of the following is true of a procedure? Check all that apply.
    10·2 answers
  • The most important hardware device for connecting supercomputers over a wide area
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!