1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
3 years ago
6

A local area network works as a ____ network in that clusters of workstations are connected to a central point (hub or switch) t

hrough which workstations can transmit messages to one another.
Computers and Technology
1 answer:
Ket [755]3 years ago
6 0
A "bus topology" fits the local area network.
You might be interested in
The transport layer protocol used by the tcp / ip suite that does not provide guarantees on ordering or confirmation of receipt
VARVARA [1.3K]
UDP = connectionless vs. TCP is connection oriented.
4 0
4 years ago
What kinds of online behaviors could be considered cyberbullying?
morpeh [17]

Answer:

anxiety, fear, depression, and low self-esteem. or flaming it refers to an online fight exchanged via emails, instant messaging or chat rooms. It is a type of public bullying that often directs harsh languages, or images to a specific person.

Explanation:

5 0
3 years ago
Read 2 more answers
While moving into a new apartment, Titus needed to hold the door open with something heavy. It suddenly dawned on him that he co
tiny-mole [99]

Answer:probably and solution

Explanation:

7 0
3 years ago
A(n) _____ is created using the select and option elements that present users with a group of predefined possible values for the
aniked [119]

Answer:

c. selection list.

Explanation:

A selection list is created using the select and option elements that present users with a group of predefined possible values for the data field.

In Computer programming, the selection list is used to avail the end users with the ability to engage in an operation such as a predefined possible values for the data field.

7 0
3 years ago
____ is the encapsulation of method details within a class.
Anestetic [448]

Implementation hiding i<u>s the encapsulation of method details within a class</u>. Implementation can be interpreted as those specifications which can be altered without altering the correctness of an application. Wrapping data/methods within classes (descriptions of the way all objects of this type will look/act) in combination with implementation hiding is called encapsulation. Information users need to know about behaviors should be available without dependence on implementation specifications.

6 0
3 years ago
Other questions:
  • What are the types of action involving data base?
    14·1 answer
  • When forced distribution is used to reduce leniency bias, this can cause __________ if a pfp system is in place?
    10·1 answer
  • (1) In Tamara's science class, the students are learning Which sentence shows an action that is extrinsically
    7·1 answer
  • Please help!! Even if you help a little I will be very thankful!
    7·1 answer
  • Was the type writer the first part of the keyboard? ​
    8·1 answer
  • Which key is used to indent the first line of a paragraph to the right?
    15·2 answers
  • Josephine is in the process of creating ads within her Standard Display campaign. She finds that there are two main ad formats t
    15·1 answer
  • A(n) ____ is a grouping of related objects within a domain,
    15·1 answer
  • What would a bar graph best be used for? State why and give 2-3 examples of things you could demonstrate with a bar graph
    5·1 answer
  • What is the answer ????​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!