1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gregori [183]
3 years ago
5

What is computer topology​

Computers and Technology
2 answers:
Nitella [24]3 years ago
7 0

Answer:

In networking, topology refers to the layout of a computer network. ... Physical topology means the placement of the elements of the network, including the location of the devices or the layout of the cables. Logical topology maps the flow of data, regardless of the physical layout.

...hope it helps...

Mashutka [201]3 years ago
3 0

Answer:

In computer networks, there are mainly two types of topologies, they are: Physical Topology: A physical topology describes the way in which the computers or nodes are connected with each other in a computer network. ... Logical Topology: A logical topology describes the way, data flow from one computer to another.

You might be interested in
A customer uses an app to order pizza for delivery. Which component includes aspects of the customer's interaction with an enter
MissTica

The available options are:

Understand the customer journey

Identify customer requirements based on their behavior and interactions

Provide a steady stream of marketing-qualified leads to the sales team

Help curate the right kind of content for customers

Provide feedback to the operations team regarding product quality

Answer:

Identify customer requirements based on their behavior and interactions

Explanation:

The component that includes aspects of the customer's interaction with an enterprise platform is "Identify customer requirements based on their behavior and interactions."

The above statement is true because when a customer uses an app to order pizza for delivery, the app can identify the customer's requirements based on the interaction between the customer and the app.

The customer uses the app to ask for what he wants, which is the requirements based on his behavior; the app identifies these wants and acts accordingly. This also shows interactions between the app and the customer.

8 0
2 years ago
You are a desktop administrator for Nutex Corporation. A user reports that he is unable to access network resources. You notice
Tju [1.3M]

Answer:

The right answer is wire crimper tool.

Explanation:

According to the scenario, the most appropriate answer is the wire crimping tool because the wire crimping tool is a tool that can strip the wire then cut it in proper shape and then crimp the wire in the RJ45 connector very effectively.

RJ45 connector is a connector which is used in ethernet cables to connect to computers i.e. cat 5, cat 5e, cat 6, etc. these cable has 4 pairs of different color codes.

A wire crimper effectively connects the end of the cable to an RJ45 connector.

4 0
2 years ago
Regular languages are closed under complement. True False
aivan3 [116]

Answer: True

Explanation:

A language is said to be closed under a operation here the complement is the operation then if upon application of that operation to any members of that language always yields a member of that language.

regular languages are closed under complement. A proof of the statement is

If a regular language 'L' is regular then there is a DFA X recognizing that regular language 'L'. to show that L' (compliment) is regular we need to have another DFA X' recognizing L'.

The initial state and transition function of both the DFAs are same except their accepting state. Then we can say that X' accepts L'.

So, we can say that regular languages are closed under complement.

4 0
2 years ago
Write a c program to print all possible marking schemes of 15 questions each with 3.
andrey2020 [161]

Answer:

#include <math.h>

#include <stdio.h>

#include <string.h>

#define BASE 3

#define NRQUESTIONS 15

void toABC(int n, char* buf, int base, int size) {

   memset(buf, 'A', size);

   buf[size] = 0;

   while (n && size) {

       buf[--size] = 'A' + (n % base);

       n /= base;

   }    

}

int main()

{

   char buf[16];

   for (int i = 0; i < pow(BASE, NRQUESTIONS); i++) {

       toABC(i, buf, BASE, NRQUESTIONS);

       printf("%s\n", buf);

   }

}

Explanation:

Assuming 3 is the number of possible answers to choose from for each question.

I tackled this by having an integer counter enumerate all values from 0 to 3^15, and then convert each integer to a base-3 representation, using ABC in stead of 012.

3 0
2 years ago
What is the difference between a heap (a minheap) and a binary search tree?
denis-greek [22]

Answer:

Some differences between Heap and Binary search trees are as following:-

A heap is a complete binary tree.While a Binary Search Tree may be  a complete,prefect binary tree.

A minheap the root should be minimum than it's children So it efficient for finding minimum and maximum.While Binary search trees have different properties the root node should be greater than the left child and should be less than the right child.

4 0
3 years ago
Other questions:
  • . Gathering information with your eyes is called __________.
    6·1 answer
  • Use this option to view your presentation as your audience will see it. a.File menu b.Play button c.Slide Show button d.Tools me
    6·2 answers
  • Check My Work _____ are made in response to situations that have occurred frequently enough to enable managers to develop decisi
    15·1 answer
  • _____ refers to unsolicited commercial emails, usually sent to a large number of people with little regard to the users interest
    14·1 answer
  • If you are writing an article on your favorite cuisine, which form of illustration would best fit the article?
    15·2 answers
  • Which of these reduces friction and makes the job of moving a freezer easier?
    10·1 answer
  • Complete the following Programming Assignment using Recursion. Use good programming style and all the concepts previously covere
    7·1 answer
  • Pseudocode is a good choice to communicate a____of a process
    10·1 answer
  • The fractional_part function divides the numerator by the denominator, and returns just the fractional part.
    10·1 answer
  • What is Japanese tradition?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!