Answer:
In a STAR TOPOLOGY network, each device on the network is attached to a central router. If the router fails, then the other devices will be unable to communicate, but if only one connected device fails, then all other devices will still be able to communicate.
Explanation:
In this type of topology all the computers are connected to a single router through a cable. This router is the central node and all others nodes are connected to the central node.
1.
#include <iostream>#include <string>
using namespace std;
int main(){ string chars; // This is where we will put our @ signs and print them for(int x=0;x < 5; x++){
chars = chars + '@'; // This will concatenate an @ sign at the end of the variable cout << chars << "\n"; }}
2.
#include <iostream>#include <string>
using namespace std;
int main(){ string name; // Our variable to store the name cout << "What is your name? \n"; // Asks the user for their name cin >> name; cout << "\nWell, hello " << name << "!";}
3.
#include <iostream>#include <string>
using namespace std;
int main(){ int number; // Our variable cout << "Enter a number\n"; // Asks for a number cin >> number; cout << "You entered " << number << "%!";}
4.
#include <iostream>#include <string>
using namespace std;
int main(){ int number; // Our variable cout << "Enter a number\n"; cin >> number;
int check = number % 2; // The modulo operator (the percent sign) gets the remainder of the quotient if (check == 0) { cout << number << " is even!"; // If the remainder is 0 then it prints out "x is even" } else { cout << number << " is odd!"; // If the remainder is not 0 then it prints out "x is odd" }}
5.
#include <iostream>#include <string>
using namespace std;
int main(){ float r; // Our variable cout << "Enter a radius\n"; cin >> r; if (r < 0){ cout << "Lol. No."; // If the radius is less than zero print out that message } float circumference=2*3.14*r; float area=r*r*3.14; cout << "\n\n Circumference of circle: " << circumference; cout << "\n Area of circle: " << area;}
Answer:
recall
Explanation:
Based on the scenario being described within the question it can be said that this was a recall measure of memory. In the field of neuroscience, a recall test refers to a type of test in which subjects are shows a certain stimuli and are later asked to remember as many stimuli as they can. Which in the case of the Godden and Baddeley (1975) study the stimuli were a set of words that were shown to the subjects.
Answer:
1)PERFORMANCE
2)RANGE
Explanation:
A mesh network can be regarded as local network topology whereby infrastructure nodes connect dynamically and directly, with other different nodes ,cooperate with one another so that data can be efficiently route from/to clients. It could be a Wireless mesh network or wired one.
Wireless mesh network, utilize
only one node which is physically wired to a network connection such as DSL internet modem. Then the one wired node will now be responsible for sharing of its internet connection in wireless firm with all other nodes arround the vicinity. Then the nodes will now share the connection in wireless firm to nodes which are closest to them, and with this wireless connection wide range of area can be convered which is one advantage of wireless mesh network, other one is performance, wireless has greater performance than wired one.
Some of the benefits derived from configuring a wireless mesh network is
1)PERFORMANCE
2)RANGE
<u>Drastic change of over society Computers:</u>
In society computer has drastically changed and it has been used to for varies purpose to do analysis or storing data, as decisions making tools. Purpose computer been found is to do huge calculation. “Compute” word has been derived to computer. Computer later stage it diverted is purpose from calculation to information store device.
Computers have heavy effect the communication in normal word and business world. Especially social media took over the control of computers. In today’s world four type of ethical issue are known in computer mainstream in the workplace they are.
1. Crime (computer)
2. failure of responsibility in the computer.
3. Protection of software records and documents etc.
4. End user data protection and privacy.
99% of computers are protected with firewalls and antivirus. But still hackers can hack the computer and steal the data.