1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
agasfer [191]
3 years ago
12

Which type of network topology allows for redundant paths between devices that can be used to bypass failed devices?​

Computers and Technology
1 answer:
Butoxors [25]3 years ago
6 0
<span>I would say a mesh topology</span>
You might be interested in
Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
vodka [1.7K]

Answer:

Link manipulation

Explanation:

With the link manipulation the phisher manipulate the URL link, in this case, the URL can seem similar to an original website, but this link sends you to a fake website, and you enter for example your bank or personal information, the phisher use this data to steal money or delicate data, sometimes these links are sent by email or text messages.

4 0
4 years ago
Compare the applications below:
alisha [4.7K]
Both can be the same thing
4 0
3 years ago
Read 2 more answers
SATCOM in the Ku- and Ka- bands, as well as EHF systems are adversely affected by rain (the higher the frequency, the greater th
kap26 [50]

Answer:Answer:

TRUE

Explanation:

SATCOM in the Ku- and Ka- bands, as well as EHF systems are adversely affected by rain (the higher the frequency, the greater the effect) because one of the factors that affects availability in a satellites is rain. Higher frequencies in Ka-band (30/20 GHz), rain can have a very large effect that simply cannot be overcome at the usual levels of availability.

Rain reduces the quality of signals by interfering with the signals thereby, reducing their strength and quality.

Therefore Rain can not only degrade a satellite's signal, it can also cause a complete outage of the satellite's.

4 0
4 years ago
Given a 13 bit address bus, how many unique addressed could be accessed? g
valina [46]
2^13 = 8192 addresses
8 0
3 years ago
To deny traffic destined to a specific tcp port you will need to apply a __________ access control list.
Fiesta28 [93]
The correct answer for the fill-in-the-blank is [user]3
4 0
4 years ago
Other questions:
  • Consider the situation you addressed in the previous question. Create numeric cost estimates for each of the costs you listed. C
    10·1 answer
  • In an ipv4 address, what are the maximum number of bits that can be used to identify the network address
    14·1 answer
  • Subnetting is accomplished by borrowing bits from the _____ portion of an ip address and reassigning those bits for use as netwo
    13·1 answer
  • PLEASE HELP!! HELP ME
    10·1 answer
  • How to show neither precious nor accurate
    13·1 answer
  • Using a process known as ____, network-based IDPSs look for attack patterns by comparing measured activity to known signatures i
    7·1 answer
  • Angelina has added page numbers to her report, but all of the pages are labeled "Page 1" at the bottom. What caused
    8·2 answers
  • Male tiene una bicicleta rosa<br>es biene o es servicio?​
    5·1 answer
  • Use the drop down menu to complete the sentences about changing and customizing the calendar view in outlook 2016​
    10·2 answers
  • .
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!