1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jolli1 [7]
3 years ago
8

Which topology, nodes must wait their "turn" before transmitting information?

Computers and Technology
2 answers:
drek231 [11]3 years ago
5 0

Token ring

Explanation:

If four computers are connected to a Star and a bus network they can share data synomously but if it’s token ring they have to wait for their turn.

bija089 [108]3 years ago
5 0

Answer:Bus

Explanation:

You might be interested in
What are the factors affecting the purchasing decision for dbms software?
djverab [1.8K]
T<span>he factors affecting the purchasing decision for dbms software are : 
</span><span>a) Cost
b) DBMS features and tools
c) Underlying model
d) Portability
e) DBMS hardware requirements</span>
3 0
4 years ago
Read 2 more answers
What is a logical grouping of related records called?.
irakobra [83]

Answer:

File

Explanation:

Files are frequently classified by the application for which they are primarily used (employee file). A primarily key in a file is the field whose value identifies a record among others in a data file

6 0
3 years ago
You've been asked to set up a temporary Internet cafe for a conference your company is hosting. You have ten laptops to use in y
kolbaska11 [484]

Answer: Cable Locks

Explanation:

  • The cable locks is one of the type of secure device that helps in physically secure the various types of laptops and computer system.
  • The cable lock helps the devices and the confidential information to prevent from theft and it is also known as the versatile security system.  
  • The cable lock is basically warp up in the form of metal cable and we usually insert the this cable lock into the laptop device slot in the system.  

  According to the given question, The cable lock is typically used in the laptop devices that protect and physically secure from the hacking purpose and it is used in the various types of deices such as printers, electronic devices and the laptops.  

7 0
3 years ago
In terms of shaping the future of cybersecurity in the United States, how influential do you think the Russian hacking efforts o
Norma-Jean [14]

The influence of the Russian hacking efforts of the 2016 election was known to be greater when compare to things like the Creeper Virus, Morris Worm, or Captain Zap’s hacking of the AT&amp;T online computer system.

<h3>What aspects of this incident could get in the way of the U.S. government responding effectively to the risks the hacking poses?</h3>

The aspect that government that government need to guard against is  stealing of government and business secret as well as people's personal information.

Note that they are a lot of tools that are known to be made up of the National Cybersecurity Protection System such as the EINSTEIN cyber intrusion detection system  and others.

Therefore, The influence of the Russian hacking efforts of the 2016 election was known to be greater when compare to things like the Creeper Virus, Morris Worm, or Captain Zap’s hacking of the AT&amp;T online computer system.

Learn more about Cybersecurity from

brainly.com/question/28004913

#SPJ1

6 0
2 years ago
If 3ten is 00000011 two, what is −3ten in an 8-bit two's complement representation?
Alexxx [7]
Yes rhenebdid eusbeyebridcr due rjeve
7 0
2 years ago
Other questions:
  • True or False? In cloud computing, the term "Measured service" refers to a billing model in which gaining access to resources do
    12·1 answer
  • Which logging category does not appear in event viewer by default?
    11·1 answer
  • We use them every day, but what is the overall purpose of a search engine?​
    10·2 answers
  • 2.24 Write the relevant Python expression or statement, involving a list of numbers lst and using list operators and methods for
    11·1 answer
  • An aircraft departs an airport in the mountain standard time zone at 1615 MST for a 2-hour 15-minute flight to an airport locate
    14·1 answer
  • Green field country is planning to conduct a cricket match between two teams A and B. a large crowd is expected in the stadium a
    6·1 answer
  • Please answer fast - screenshot included.
    5·1 answer
  • 6.Which of the following statements illustrates a characteristic of a person's attitudes
    14·2 answers
  • PLEASE SOMEONE PLEASE HELP ME OUT!!!!
    10·2 answers
  • I NEED HELP!! THIS IS 3D COMPUTER MODELING COURSE IN CONNEXUS
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!