1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solniwko [45]
3 years ago
9

When you connect several home devices using a wireless router, what network topology are you using? A. bus B. mesh C. star D. ri

ng
Computers and Technology
1 answer:
bonufazy [111]3 years ago
3 0

Answer:

Star Topology

Explanation:

Because the definition of Star Topoplogy is: In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn’t allow direct communication between devices, a device must have to communicate through hub. If one device wants to send data to other device, it has to first send the data to hub and then the hub transmit that data to the designated device.

You might be interested in
[ANSWER = BRAINLIEST] How to mark an answer as brainliest?
Hoochie [10]

Answer:

once your question is answered you get an option available on the bottom of the answer

<em>see attached</em>

and you click on<u> Mark as brainliest </u>

8 0
3 years ago
Read 2 more answers
When troubleshooting firewalls, which of the following is not something you should do after you attempt a fix?
mart [117]

Answer:

a. make multiple fixes.

Explanation:

When we are troubleshooting firewalls we should not make multiple fixes after attempting a fix because it will not be beneficial for the security purpose.

We can repeat the failure after attempting the fix because we can fix it but a person with right mind won't be doing that.

We can test after each attempt that it is working properly.

We can also  reverse or undo the solution failures after making a fix.

5 0
4 years ago
Where could an identity theft access your personal information
Nikolay [14]
Hello!

The identity theif could establish a new identity for ciminal purposes using YOUR identity and personal information, and the theif could aquire money or goods from it.

*PLAGIARISM FREE*
5 0
3 years ago
Read 2 more answers
Children may be placed in restraining devices such as high chairs, swings or bouncy seats
Ratling [72]
Yes in my opinion. People will say no but there is no right answer
8 0
3 years ago
which application software allows you to compose written ideas on a computer? database, spreadsheet, word processor or graphics
Kazeer [188]
Word processor because it's more for writing
8 0
3 years ago
Other questions:
  • William has an internet connection that does not allow him to make calls when connected to the Internet. What internet service c
    8·2 answers
  • Im being timed please help!!
    7·2 answers
  • Rewrite this if/else if code segment into a switch statement int num = 0; int a = 10, b = 20, c = 20, d = 30, x = 40; if (num &g
    13·1 answer
  • Which describes the first step a crawler-based search engine uses to find information?
    10·2 answers
  • Which component of the windows desktop allows you to retrieve files that have recently been deleted?
    11·1 answer
  • I need help with question 3 I’ll give brainliest
    10·2 answers
  • Photoshop files are generally small in size. True or false
    13·1 answer
  • I need help!! I decided to go back to college this year and am taking Intro to Logic and Programming. I have an assignment due t
    5·1 answer
  • Write a Temperature class that represents temperatures in degrees in both Celsius and Fahrenheit. Use a floating-point number fo
    5·1 answer
  • if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!