1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
agasfer [191]
3 years ago
10

Switched backbone networks:_____.a. always use a ring topology.b. require much more management that do routed backbone networks.

c. use a star topology with one device, usually a switch.d. are the least common type of BN used in one building.e. switch the traffic based on layer 3 addresses.
Computers and Technology
1 answer:
Gre4nikov [31]3 years ago
7 0

Answer:

c

Explanation:

spongo  

You might be interested in
Which network is the predecessor of the Internet?
disa [49]
The predecessor of the internet is ARPANET better known as Advanced Research Project Agency
4 0
3 years ago
What is a Windows feature that allows you to temporarily store text?
nata0808 [166]
This would be copy and paste.

When you select a text, you can use your keys CTRL and C to copy that same selected text. After this, you can use the paste feature by selecting CTRL and V. Doing this, your selected text will be copied and pasted to a certain location. 
3 0
3 years ago
How does coding robots fit into STEAM
expeople1 [14]
Coding robots fits into the technology part of STEM.
5 0
4 years ago
You receive a suspicious text message from an unknown sender asking you to click on a link to access your current credit score.
Lyrx [107]

Answer: Phishing

Explanation: A cybercrime in which, a target or targets are contacted by email, telephone or text message by someone acting or posing as a legitimate institution to lure these targets or a target into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords is referred to as Phishing.

The CyberCriminals use these information to access important accounts, steal identities and even money.

Beside email and website phishing, there are phishing methods like 'vishing' (voice phishing), 'smishing' (SMS Phishing).

SOME FEATURES OF PHISHING EMAILS

The Emails are usually Too Good To Be True with a sense of Urgency, telling you to click on the link fast because the offers are limited.

They may tell you that your account will be suspended unless you update your personal details immediately and with attachments you are supposed to click on and from an unusual sender.

Whether it looks like it's from someone you know or don't know if anything seems out of the ordinary, unexpected, out of character or just suspicious please don't click on it the link. It might just be phishing.

7 0
3 years ago
What are the use of computer at office?​
KIM [24]

Answer:

playing games XD

Explanation:

hahahahahahahahhaha

8 0
3 years ago
Read 2 more answers
Other questions:
  • Laura is using studio lighting while photographing a model. The four elements that she will use in studio lighting are hot light
    10·1 answer
  • Develop an sec (single error correction) code for a 16-bit data word. generate the code for the data word 0101000000111001. show
    6·2 answers
  • What year did Elvis die? Right answer 1977.
    14·1 answer
  • Write a program that prompts the user for an integer and then prints all prime numbers up to that integer.
    7·1 answer
  • Grid computing takes advantage of the available 75% of unused processing power of a computer and links thousands of individual c
    13·1 answer
  • Which of the following contains hardware systems similar to the affected organization but does not host live data?
    13·1 answer
  • If someone wanted to talk to a financial institution representative in person they would need to _____.
    5·1 answer
  • Match each command group under Picture Tools to the appropriate tasks.
    6·1 answer
  • I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I t
    11·1 answer
  • Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!