1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatuchka [14]
3 years ago
13

In a _____ network, each device on the network is attached to a central router. If the router fails, then the other devices will

be unable to communicate, but if only one connected device fails, then all other devices will still be able to communicate.
Computers and Technology
1 answer:
Damm [24]3 years ago
7 0

Answer:

In a STAR TOPOLOGY network, each device on the network is attached to a central router. If the router fails, then the other devices will be unable to communicate, but if only one connected device fails, then all other devices will still be able to communicate.

Explanation:

In this type of topology all the computers are connected to a single router through a cable. This router is the central node and all others nodes are connected to the central node.

You might be interested in
WHAT DO YOU KNOW?<br> Why would you want to change your Table<br> Properties?
joja [24]

read the slides ;  Table Properties are the way the table appears or looks.

6 0
3 years ago
What did you predict will happen? Check all that apply. The lioness will attack Thisbe. Thisbe will stay hidden in the cave to a
sesenic [268]

Hi,


Everything applies. It is impossible to predict based on the current data. All scenarios are possible with equal possibility.


Hope this helps.

r3t40

5 0
3 years ago
Read 2 more answers
When you move the pointer to the left of two existing rows, a(n) ____ appears outside the table.?
marishachu [46]
When you move the pointed to the left of two existing rows, a SUPER POINTER appears outside the table. 

The super pointer is usually a small black arrow or a white arrow that is pointing to the right. Clicking the mouse while the super pointer is active will select the row. 

The super pointer also appears when the mouse pointer is at the top edge of a column. The super pointer will be pointing downwards. 
6 0
3 years ago
Information technology (IT) _____ is a framework that ensures that information technology decisions are made while taking into a
dexar [7]

Answer:

"IT governance" is the answer for the above question.

Explanation:

  • "IT governance" is a type of framework which is related to information technology and It is used to justify that the processor takes by the organization is in the right direction or not.
  • It suggests the user take the decisions to achieve the business goal for the objective of the organization.
  • The above question asked about the framework which is used to ensure the objective of a business is achieved by the process or not. So that framework is known as "IT governance".
8 0
3 years ago
Organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords
guajiro [1.7K]

Answer:

a) true

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

With cybersecurity theory, security standards, frameworks and best practices we can guard against cyber attacks and easy-to-guess passwords.

An example of best practices in cybersecurity is the use of alphanumeric password with certain composition and strength, such as a minimum of eight (8) characters. This would ensure there's a formidable wall to protect data and an unauthorized access or usage of the system network.

A dictionary attack typically involves accessing a list of commonly used passwords by end users rather than a random guess.

Hence, organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords.

7 0
3 years ago
Other questions:
  • To change the background color of a page, which tab would you use?
    15·2 answers
  • What were precomputed tables and why were they necessary?​
    12·2 answers
  • Nowadays, most online discussion boards are on Web-based forums that provide a variety of user-friendly tools to create and post
    13·1 answer
  • When Clara accesses the programs and documents on her computer by way of icons, she is said to be employing
    15·1 answer
  • The network layer of the Internet model uses the _____________ protocol to route messages though the network.
    13·1 answer
  • Darian has a gourmet cupcake business and needs a website to compete with the other bakeries in his area. He has a Google My Bus
    15·1 answer
  • Fill in the blanks. The ________________ donut chart shows the distribution across your website’s pages by the number of clicks
    14·1 answer
  • Which of the following is a requirement for the Safety Data Sheet (SDS)?​
    5·1 answer
  • An administrator needs to set up an authentication server for users connecting to a network through a VPN. What kind of server c
    12·1 answer
  • What do workspaces allow a company to do?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!