1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
8

Briefly explain about five kinds of network topology ​

Computers and Technology
1 answer:
MrRissso [65]3 years ago
7 0

Answer:

The mapping of the LAN (local area network) is design called as Topology.

Explanation:

The network topology is to perform a arrangement of the network to the connect sender and receiver in the network connection, there is a five type of topology is there are:- (1) tree topology (2) star topology (3) ring topology (4) bus topology (5) mesh topology.

  • (1) Tree topology is the nodes are connecting to the hierarchical form it is called by the hierarchical topology its used in the wide area network, and they are manage and maintain the easily, they work in the group.
  • (2) star topology is to the connected to the all computers in a single hub cable through, it is dedicated to the hub connection, star topology is the setup and modify to the network and nodes and low network, is to expensive to use.
  • (3) Ring topology is tho perform it computer to connect by the another computer for each device, ring topology is the use large number and to star topology is to install and expand, troubleshooting is the difficult in the ring topology.
  • (4) Bus topology is the contain computer network device is connected to the single cable, and this only one direction system, bus topology is used in small networks and bus topology is the cost effective, and the bus topology is the limited length cable.
  • (5) Mesh topology is to perform point to point connection to computer devices, and to transmits data to two ways (1) routing (2) flooding.
  • Mesh routing is network requirement and has information of the broken links.
  • Mesh flooding is transmitted to the all computer network and leads to load over network.
You might be interested in
You would like to create a graph that shows how much of your total investments are in stocks, savings, and mutual funds. You sho
sdas [7]
The answer is D. line graph
4 0
3 years ago
Read 2 more answers
Which statement describes what the Conditional Formatting option in Excel 2016 allows users to do?
jeyben [28]

Answer:

It automatically applies formatting based on specific rules or conditions being met. It automatically applies highlighting to selected cell ranges based on specific rules or conditions being met.

Explanation:

6 0
3 years ago
Read 2 more answers
What is a good analogy for explaining the actions of a compiler?
kozerog [31]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about what is a good analogy for explaining the actions of a compiler?  The correct option is <u> automatic programming of kitchen devices .</u>

<u> </u>

a hybrid ability of a car to use multiple energy sources  (false)

this analogy is not correctly mapped on the compiler, becuase the compiler can be designed only for one type of language, for example, the program that calculates the average of students number can be easily programmed in C++ and in C#. But you cannot compile the C# program in C++ compiler and vice versa.  

a street map of a local subdivision  (false)

Because you can design a compiler for a not specific subdivision of programming.

an interpreter who speaks several languages

it is not an analogy, however, an interpreter can handle only one type of language.

an automatic programming of kitchen devices (true)

This is a good analogy of compiler because you give input to the device and that device based on your input gives you back an output. Similarly, you give input to the compiler in form of language syntax, and it automatically give you output based on your input.

3 0
3 years ago
Given two ArrayLists of sorted strings (alphabetically ascending), write down a method to merge these sorted strings’ ArrayLists
Elena-2011 [213]

Answer:

see explaination

Explanation:

import java.util.ArrayList;

import java.util.Arrays;

public class Merge {

public static ArrayList<String> mergeList(ArrayList<String> lst1, ArrayList<String> lst2) {

ArrayList<String> result = new ArrayList<String>();

int i = 0, j = 0;

while (i < lst1.size() || j < lst2.size()) {

if (i < lst1.size() && (j >= lst2.size() || lst1.get(i).compareTo(lst2.get(j)) < 0)) {

result.add(lst1.get(i++));

} else {

result.add(lst2.get(j++));

}

}

return result;

}

public static void main(String[] args) {

ArrayList<String> lst1 = new ArrayList<>(Arrays.asList("Austin", "Dallas", "San Fransisco"));

ArrayList<String> lst2 = new ArrayList<>(Arrays.asList("Boston", "Chicago", "Denver", "Seattle"));

System.out.println(mergeList(lst1, lst2));

}

}

8 0
3 years ago
Which of the following sets of acronyms is concerned with encoding data for secure transmission?
guapka [62]

I'm pretty sure your answer is VPN. Hope this helps!

7 0
3 years ago
Other questions:
  • An effectively distributed resume will get an interview
    12·2 answers
  • Your friends know that you understand a lot about computers, both the technical details of how they operate as well as informati
    12·1 answer
  • You have compiled a new kernel using rpm. when you reboot, the new kernel is not the default selection on the boot menu. you use
    10·1 answer
  • If the Account Number field in a record always should display the three characters in the account number in uppercase, then the
    14·1 answer
  • One common method of converting symbols into binary digits for computer processing is called ASCII​ (American Standard Code of I
    5·1 answer
  • Siapa mahapatih brainly.com atau yg disebut Brainly Amerika Serikat ?​
    5·1 answer
  • Please HELP me it a test and it due rn. Please no links
    9·1 answer
  • Which of the following are valid variable names? Select 2 options.
    14·1 answer
  • When writing a function or a formula in a spreadsheet,what is the first u should do​
    5·1 answer
  • Difference between hacking and cracking not hackers and crackers ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!