1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
8

Briefly explain about five kinds of network topology ​

Computers and Technology
1 answer:
MrRissso [65]3 years ago
7 0

Answer:

The mapping of the LAN (local area network) is design called as Topology.

Explanation:

The network topology is to perform a arrangement of the network to the connect sender and receiver in the network connection, there is a five type of topology is there are:- (1) tree topology (2) star topology (3) ring topology (4) bus topology (5) mesh topology.

  • (1) Tree topology is the nodes are connecting to the hierarchical form it is called by the hierarchical topology its used in the wide area network, and they are manage and maintain the easily, they work in the group.
  • (2) star topology is to the connected to the all computers in a single hub cable through, it is dedicated to the hub connection, star topology is the setup and modify to the network and nodes and low network, is to expensive to use.
  • (3) Ring topology is tho perform it computer to connect by the another computer for each device, ring topology is the use large number and to star topology is to install and expand, troubleshooting is the difficult in the ring topology.
  • (4) Bus topology is the contain computer network device is connected to the single cable, and this only one direction system, bus topology is used in small networks and bus topology is the cost effective, and the bus topology is the limited length cable.
  • (5) Mesh topology is to perform point to point connection to computer devices, and to transmits data to two ways (1) routing (2) flooding.
  • Mesh routing is network requirement and has information of the broken links.
  • Mesh flooding is transmitted to the all computer network and leads to load over network.
You might be interested in
A user can view <br> and <br> in the Reading pane.
dolphi86 [110]

Answer:

sorry,but I can't understand your question.

7 0
3 years ago
_____ is a scam in which access to one's own computer is locked or restricted in some way.
gtnhenbr [62]
Ransomware is the answer to this.
5 0
3 years ago
Why would you want to hyperlink objects into your own Google Slides presentation? (Select all that apply.) Select All Correct Re
asambeis [7]

The correct answers are A.  For extending the learning experience for students. C. So students can use the Slides for review and can go to additional resources outside of the presentation. D. To make the presentation more graphically appealing

Explanation:

The use of hyperlink objects in presentations means objects such as images, texts, or icons are associated with links or websites students can easily access by clicking on the specific image or element. This might be used in educational contexts to allow students to have a complete learning experience by providing alternative and external sources outside the presentation. For example, if the topic is space hyperlinks to NASA website can be included. This means, hyperlink objects extend learning experiences and provide additional resources (Option A and D).

Besides this, this resource can make a presentation more appealing as links to images, videos, and other visually interesting resources can be included (Option D). However, it also breaks the linearity of the presentation as students will need to move to other websites as they go through the presentation.

5 0
3 years ago
write a python function that takes the largest and smallest numbers in a list, and swap them (without using min() or max() )
Akimi4 [234]

Answer:

def SwapMinMax ( myList ):

   myList.sort()

   myList[0], myList[len(myList)-1] = myList[len(myList)-1], myList[0]

   return myList

   

Explanation:

By sorting the list, you ensure the smallest element will be in the initial position in the list and the largest element will be in the final position of the list.

Using the len method on the list, we can get the length of the list, and we need to subtract 1 to get the maximum element index of the list.  Then we simply swap index 0 and the maximum index of the list.

Finally, we return the new sorted list that has swapped the positions of the lowest and highest element values.

Cheers.

8 0
3 years ago
For a policy to become enforceable, it must meet five criteria, which are?
Karolina [17]

A policy must be distributed, evaluated, understood, consistent, and followed in order to be enforceable.

What is enforceable?

A legally enforceable right of set-off is one that is valid and recognized in all situations (ie enforceable both in the normal course of business and on the default, insolvency or bankruptcy of one of the counterparties).

Distribution denotes that the policy has been made accessible to all personnel for the evaluation process (through events or notification). The second condition defines the content's readability, taking into account the challenges faced by speakers of foreign languages and complex terms (using simple and precise wording to remove uncertainty).

Understanding the terms of the policy is tested through comprehension, and uniform application of the policy is assessed through consistency. Finally, compliance denotes agreement among all parties to abide by the rules.

Learn more about enforceable policy click here:

brainly.com/question/26984272

#SPJ1

8 0
2 years ago
Other questions:
  • Consider an interface p ublic interface NumberFormatter { String format (in n); } Provide four classes that implement this inter
    15·1 answer
  • The drone intercepts at 1256 hour. what time do they plane to take control of the drone
    11·1 answer
  • A software architecture that divides an application into view, business logic, and data is called a(n) ________.â
    14·1 answer
  • Data mining is defined as: a)Separating data and programs such that each can be changed without changing the other b)Allowing ma
    5·1 answer
  • Developers and organizations all around the world leverage ______ extensively.
    9·2 answers
  • 1.  
    15·1 answer
  • Techniques that shape material without removing material.​
    6·1 answer
  • How do I send the face to the back? Seriously, I can't find out how...
    13·1 answer
  • Which of these is a standard for describing a wifi network?
    14·1 answer
  • You want to make access to files easier for your users. Currently, files are stored on several NTFS volumes such as the C:, D:,
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!