1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zloy xaker [14]
3 years ago
9

Your company's network topology diagrams aren't very detailed so you're helping to improve them. The new set will have separate

physical and logical diagrams. What should you make sure to put in the logical diagrams?
Computers and Technology
1 answer:
grin007 [14]3 years ago
7 0

Answer:

The logical diagrams must show the data flow directions.

Explanation:

Logical diagrams are depicted with data flow diagrams.  Data flow diagrams (DFD) use standardized symbols or notations, including rectangles, circles, arrows, and short-text labels, to describe a business system or process' data flow direction, data inputs, data outputs, data storage points, and its various sub-processes.  Therefore, this summary implies that data flow diagrams are broadly divided into two: logical and physical data flow diagrams.  The logical DFD concentrates on the business events and the data required for each event.  The physical DFD depicts how the data system will work, such as the hardware, software, paper files, and people involved.

You might be interested in
1. Different algorithms are used to make decisions on load balancing. These include random allocation, round-robin, weighted rou
jok3333 [9.3K]

Answer:

The algorithms and their advantages-disadvantages are given below.

Explanation:

1. Least Connection

Advantage:

The load balances track the transfers constantly, as well as read the details.

Disadvantage:

Server efficiency is indeed not optimal because there are different application computing abilities.

2. Round robin:

Advantage:

Implementation is simple and easily understandable.

Disadvantage:

This methodology or algorithm seems to be suitable for more than just clusters composed of servers with similar specs.

3.  Least Loaded Algorithm

Advantage:

We relate to that as the base technique, and then use it as the basis for comparison with several other strategies results.

Disadvantage:

Such knowledge is almost always unclear when the demands appear, and therefore it is quite hard to accomplish to be using the standard algorithm.

4. Dynamic Round Robin

Advantage:

Easy to execute, it calculates almost all of the server pressures in real-time.

Disadvantage:

Might trigger one processor to overrun while some are underutilized.

5. Weighted Round-Robin Allocation

Advantage:

This is an evolved round-robin edition that removes the shortcomings of that algorithm in a straightforward round.

Disadvantage:

It doesn't quite recognize the specialized criteria for high availability, including response times for each application.

3 0
3 years ago
The general who directed the project responsible for the "Fat Man” graduated from what alma mater in 1918?
krek1111 [17]
Stafford Leak Warren (July 19, 1896 - July 26, 1981) was an American physician and ... He was responsible<span> for the health and safety of the thousands of personnel ... The medical school had opened in 1925 and did not </span>graduate<span> its first class ... Brigadier</span>General<span> Leslie R. Groves, the director of the Manhattan </span>Project<span> </span>
7 0
4 years ago
Read 2 more answers
Suppose a file system can have three disk allocation strategies, contiguous, linked, and indexed. We have just read the informat
otez555 [7]

Answer:

Since we are using three disk allocation strategies,continuous linked and indexed,therof to process and read allocation strategies we need 99830 disk blocks.

6 0
4 years ago
Select the correct answer.
Gnesinka [82]

Answer:

D.

Explanation:

I think.

4 0
2 years ago
QUESTION 4 of 10: What term refers to the basic characteristics of a population segment, such as gender, age, and income?
marshall27 [118]
272727727272727226282829292
7 0
4 years ago
Read 2 more answers
Other questions:
  • Which type of network medium is used by an integrated services digital network adapter?
    14·1 answer
  • What is the most common way for computing systems and devices to authenticate a person’s identity? citi
    10·1 answer
  • An attacker sets up a look-alike wi-fi network, tempting unsuspecting users to connect with the attacker's wi-fi network instead
    5·1 answer
  • Write the percentage 5 1/4 as a decimal​
    8·1 answer
  • You are going to write a program for Computer test which will read 10 multiple choice questions from a file, order them randomly
    11·1 answer
  • Katie wants to use VLOOKUP for a column in a table. Which value of the mode parameter should she use to look for an exact match
    7·1 answer
  • What is an electronic ledger that tracks mathematical data
    14·1 answer
  • Write a method that determines the total number of chars in each string of an array.
    12·1 answer
  • Sidney needs to create a decimal number variable that will be added to another number. What kind of variable is required?binaryB
    15·1 answer
  • Fundamental of Computer Science
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!