1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brrunno [24]
3 years ago
15

What is star topology

Computers and Technology
2 answers:
Alexxx [7]3 years ago
4 0
Every node connects to a central network device. like a hub, switch, or computer.
White raven [17]3 years ago
4 0
It’s a local area network in which all nodes are individual connected to a central connection point, like a hub or a switch
You might be interested in
________ is a process where authentication and permission will be passed on from one system to another, usually across multiple
hoa [83]

Answer: Federation

Explanation:

In multiple enterprises there are number of authentication processes to access resources and information so in order to avoid a large number of authentications we have a process called federation whereby all the authentication and authorization processes are passes from one system to the other within the enterprise.

3 0
3 years ago
If you have _____, you can evaluate whether information is misleading, biased, or out of date. Group of answer choices informati
Zepler [3.9K]

Answer:

information literacy

Explanation:

8 0
3 years ago
Cycle technology implemented a dibs initiative last year for one of the manufacturing sites. however, the initiative is not prog
shtirl [24]
  • A possible reason the DIBS initiative is not developing as planned is that the company keeps DIB separate from day-to-day operations. DIB must be part of the ecosystem in running the company and not separate.

  • A manufacturing process is the method a business will follow to make the product. The type of manufacturing you can use is determined by several factors such as the market demand for products, the state of raw materials, and the availability of resources and the state of your factory. The manufacturing techniques are all different and have their respective advantages if used in accordance with Standard Operating Procedures and of course also have disadvantages for each manufacturing technique.

Learn more about Manufacturing Process here brainly.com/question/28384697

#SPJ1

5 0
2 years ago
Which method would you use to get the value associated with a specific key and remove that key-value pair from the dictionary
ollegr [7]

Answer:

popitem

items

pop

list

Explanation:

5 0
2 years ago
On the Next Generation firewall, what type of security profile detects infected files being transferred with the application?
laiz [17]

Answer:

Anti-Virus.

Explanation:

Anti-virus is the type of security profile detecting infected files transmitted with the software.

It is a kind of program that designed and developed to guard computers against threats such as malware, program viruses, trojan, botnets, keylogging software, malicious software etc. The following apps work for scanning, detecting and removing threats out of your system.

6 0
3 years ago
Other questions:
  • Dams provide what kind of energy ?
    5·2 answers
  • John would like to move from the suburbs into the city, but the rent in the city is very high. John has found an apartment he re
    13·1 answer
  • Write the function mystrchr(). the function has two parameters: a const char * s pointing to the first character in a c-style st
    14·1 answer
  • The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
    7·1 answer
  • Which type of computer network ensures high security
    10·1 answer
  • What is the full from of CPU?​
    5·2 answers
  • Is a collection of information stored under a single nam​
    6·2 answers
  • BitTorrent, a P2P protocol for file distribution, depends on a centralized resource allocation mechanism through which peers are
    8·1 answer
  • You designed a program to create a username using the first three letters from the first name and the first four letters of the
    6·1 answer
  • Xxx<br>uuuuuu<br>uuuu<br>jjnmn<br>jjh
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!