1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darina [25.2K]
2 years ago
15

A(n) ____________ network should NOT be used when there are more than about twenty-five computers. Select one: a. Ring b. Ethern

et c. Peer-to-peer d. Client/server
Computers and Technology
1 answer:
nata0808 [166]2 years ago
8 0
D the answer is client and server I believe
You might be interested in
Which of the following does not make a good analysis class? (Points : 6) its name reflects its intent
satela [25.4K]

Answer:it has high coupling

Explanation: Coupling is the property in the field of computer program that is defined as the functions ,data and  codes of the program are dependent on each other and cannot be changed independently if requires. Thus,high amount of coupling is not considered as good factor due to high interdependence. Loose coupling can be still permitted.

Other options are correct because name of the class should reflect the purpose and well defined responsibilities should be present, modeling of certain component and high cohesion means keeping similar functions togather is also required. So, the only bad factor is high coupling

6 0
3 years ago
The two major types of system software programs are utility programs and the ________. Select one: A. user interface B. supervis
Scrat [10]

Answer:

operating system

Explanation:

System software are those programs that many refer to as computer programs. The most basic function of system software is to manage the computer systems. It acts as an interface between the computer’s hardware and the end user. System software converts instructions that end users give to the computer into a machine understandable language. Examples of system software include operating systems, utility programs, device drivers, and windows systems. The operating system is responsible for the functioning of all the computer’s hardware parts. It is the software loaded into the system when the computer boots up. It manages everything, from the memory, to the CPU, and many other different tasks.

8 0
3 years ago
RDBMSs enforce integrity rules automatically. <br> a. True<br> b. False
IRINA_888 [86]

It is true. RDBMS enforce integrity rules automatically. Integrity rules are automatically enforced by RDBMSs.

Integrity rules are automatically enforced by RDBMSs. Because it contains the design choices made regarding tables and their structures, a data dictionary is frequently referred to as "the database designer's database." Any character or symbol intended for mathematical manipulation may be contained in character data.

Data points that are connected to one another are stored and accessible in a relational database, which is a form of database. The relational model, an easy-to-understand method of representing data in tables, is the foundation of RDBMS. Each table row in a relational database is a record with a distinct ID known as the key.

It is simple to determine the associations between data points because the table's columns carry the properties of the data and each record typically has a value for each property.

To know more about RDBMS click on the link:

brainly.com/question/13326182

#SPJ4

8 0
1 year ago
What was the basic invention that has evolved into the modern automobile?
anygoal [31]

Answer:

I would say Henry Ford's invention; the Ford car company, since we still have Ford cars running nowadays.

Explanation:

3 0
3 years ago
EASY POINTS
Dmitry [639]
Its answer D because I took the same test and it told me that my answer was right that I put down and it was D.

3 0
2 years ago
Other questions:
  • Jeff wants to print quickly so he presses the Ctrl and the P. Jeff used a _____. macro invoice template shortcut
    15·1 answer
  • Which protocol can be used to send ipv6 packets over an ipv4 network?
    5·1 answer
  • Name the function in Python that prompts user to enter values as per the data type specified.
    5·1 answer
  • To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for
    6·1 answer
  • Write a function to output an array of ints on a single line. Funtion Should take an array and an array length and return a void
    9·1 answer
  • What is Brainly?<br><br> A.Yes<br> B.No
    12·2 answers
  • Choose the word that matches each definition. : processed facts, how the output is used for making decisions : action performed
    12·2 answers
  • Is amazon a e-commerce website <br> o true <br> o false
    8·2 answers
  • Which browser feature will delete your history, cache, and cookies the moment you close the special window
    6·1 answer
  • Choose the best answer from the options below to complete the following sentence.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!