1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
agasfer [191]
3 years ago
12

Which type of network topology allows for redundant paths between devices that can be used to bypass failed devices?​

Computers and Technology
1 answer:
Butoxors [25]3 years ago
6 0
<span>I would say a mesh topology</span>
You might be interested in
User can use ______ commands to search for and correct words in a document
Maksim231197 [3]
Find and replace is the answer
5 0
3 years ago
A ____ is text and graphics that print at the top of each page
Volgvan
It would probably be the header.
3 0
3 years ago
Briefly explain the technology used for fifth generation computers​
lisov135 [29]

Answer:

Fifth Generation is 1980 to date. VLSI (Very Large Scale Integration) Technology became ULSI (Ultra Large Scale Integration) technology resulting in the production of microprocessor chips having ten million electronic components. Fifth Generation is based on parallel processing hardware and Artificial Intelligence.  

Explanation:

3 0
3 years ago
A moldboard was a feature and technological development of what device
wlad13 [49]
The moldboard is a curved iron wedge formed by the curved part of a steel plow blade that turns the furrow <span>used to lift and turn the soil.</span><span>
A moldboard was a feature and technological development of the device plow.
</span>It was used in farming for initial cultivation of soil, for preparation for sowing seed or planting to loosen or turn the soil. 
5 0
3 years ago
What is a benefit of starting a new business from scratch?
skad [1K]

Answer:

You can do what you want

Explanation:

The sky is the limit

3 0
3 years ago
Other questions:
  • 1.Write the Qbasic program to find sum of any 10 different numbers.
    12·1 answer
  • What is the purpose of the operating systems management function
    5·1 answer
  • Martha wants to create an image for her Web site. Martha should use _____.
    15·2 answers
  • Malware is a combination of which two words? A. malevolent and software B. malignant and software C. maladapted and software D.
    8·1 answer
  • PLEASE I NEED HELP PLEASE PLEASE<br> Which function prompts the user to enter information?
    9·1 answer
  • What method do phishing and spoofing scammers use
    12·1 answer
  • Exercise : Randomizer In this exercise, we are going to create a static class Randomizer that will allow users to get random int
    14·1 answer
  • Who was the first person to develop http the language in which servers and browsers communicate
    11·1 answer
  • Why star topology is more reliable than bus or ring topologies
    7·2 answers
  • ___ data is ____data; non-numeric data; observations are organized into categories without any recognition of order.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!