1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brrunno [24]
2 years ago
15

What is star topology

Computers and Technology
2 answers:
Alexxx [7]2 years ago
4 0
Every node connects to a central network device. like a hub, switch, or computer.
White raven [17]2 years ago
4 0
It’s a local area network in which all nodes are individual connected to a central connection point, like a hub or a switch
You might be interested in
Please help me with these questions​
Ierofanga [76]

Answer:

cant see it properly :(

Explanation:

6 0
3 years ago
Read 2 more answers
In what document does the program manager (pm) address the demilitarization and disposal requirements?
Nana76 [90]

Life Cycle Sustainment Plan (LCSP) is the document that the program manager (pm) addresses the demilitarization and disposal requirements.

<h3>What is Life Cycle Sustainment Plan?</h3>

Life Cycle Sustainment Plan is a plan or service that works during the trade of weapons or system work regarding militarization. This system works on the development and handling of the weapon system.

So, Life Cycle Sustainment Plan will be used in the demilitarization and management requirements.

Thus, the name of the document program is Life Cycle Sustainment Plan.

To learn more about Life Cycle Sustainment Plan, refer to the below link:

brainly.com/question/1272845?referrer=searchResults

#SPJ1

3 0
1 year ago
You are planning to write a guessing game program where the user will guess an integer between one and 20. Put the commented ste
Rudiy27

Answer:

1. Generate a random number

2. Ask the user for a guess.

3. Compare the user's answer to the correct number.

4. Give the user a hint as to whether their guess is too high or too

Explanation:

Leave a like and brainist if this helped

7 0
2 years ago
O How basic blocks are identified and how the blocks are used to construct control flow graphs
OLEGan [10]

Basic blocks are identified  because they are known to be a straight line that is known also as a code sequence that tends to have no branches in regards to its in and out branches and its exception is only to the entry and at the end.

Note that  Basic Block is said to be a composition  of statements that is known to be one that often always executes one after other, and this is often done in a sequence.

<h3>How do you create a flow graph from the basic blocks?</h3>

Flow graph  is gotten by:

  • Lets Block B1 be the initial node and also Block B2 will tend to follows B1, so from B2 to B1 there is seen a kind of an edge.

Note that the first task is for a person to partition a sequence of three-address code and this is done into basic blocks.

Hence, Basic blocks are identified  because they are known to be a straight line that is known also as a code sequence that tends to have no branches in regards to its in and out branches and its exception is only to the entry and at the end.

Learn more about basic blocks from

brainly.com/question/132319

#SPJ1

5 0
1 year ago
Virtualization, like cloud computing, is a technology that can be useful for _____ sites. hot warm business cold
natima [27]

Answer: Hot sites

Explanation:

 Virtualization in the cloud computing is the technology that are useful for the hot sites. It basically making the virtual image of the network devices so that it can be easily use multiple machine at the similar time.

There are various types of benefits of the virtualization in the cloud computing are as follow:

  • It protect the system from the system failure.
  • It is the cost effective technology.
  • By using this we can easily transfer the data from the physical storage to the virtual server.
8 0
3 years ago
Other questions:
  • Although highly accurate navigational information from the GPS constellation is exploitable by adversary forces, it is unlikely
    5·1 answer
  • The jailbreak property that, if the user turns the device off and back on, the device will start up completely, and the kernel w
    15·1 answer
  • A location in memory used for storing data and given a name in a computer program is called a because the data in the location c
    14·1 answer
  • In general, digital to analog modulation equipment is less expensive than the equipment for encoding digital data into a digital
    8·1 answer
  • My computer just fried anybody know why it did that?
    14·2 answers
  • A workstation with a static IP (Internet Protocol) address can print and authenticate to a server, but cannot browse to www.comp
    14·1 answer
  • Write a program to input a number.Find the sum of digits and number of digits
    10·2 answers
  • Help plz (will give brainliest)
    9·1 answer
  • A programmer wants to determine whether a score is within 10 points of a given target. For example, if the target is 50, then th
    11·1 answer
  • When adding a component to a container with the ____ layout, specify the NORTH, EAST, SOUTH, WEST, or CENTER position.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!