1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
2 years ago
9

True and false 1. Trace topology is also referred to as tree bus topology. ​

Computers and Technology
1 answer:
algol132 years ago
6 0

Answer:

Trace topology is also referred to as tree bus topology.

Explanation:

You might be interested in
Which of the following is not regression test case? A. A representative sample of tests that will exercise all software function
AveGali [126]

Answer:

D. Low-level components are combined into clusters that perform a specific software sub-function

Explanation:

Normally, regression testing are done on a manual basis by simply re-executing a subset of the entire available test cases or it can be done automatically by utilizing playback tools or automated capture. Hence, from the options, a combination of low-level components into clusters that perform a specific sub-function does not align with how regression testing are done either manually or automatically.

6 0
3 years ago
In addition to avoidance and adaptation, two other means of risk reduction available to managers are ________ and ________. A. q
MrRissso [65]

Answer:

(b). dependency and hedging.

Explanation:

In the management of risk, four common approaches for reducing risk are;

i. <em>Avoidance</em>: Especially if a risk involved in the management of a resource (or project) poses or presents a negative consequence, the best way to manage the risk simply avoid it by making sure it doesn't happen. This can be by cancelling a project or restructuring it.

ii. <em>Adaptation</em>: Another way of managing the risk associated with a resource (human or non-human resource) is to control the risk either by increasing resilience or reducing vulnerability. This is called adaptation.

iii. <em>Dependency: </em>This means accepting the risk since every project or business has inherently in it some risk associated. Dealing with it might be a way out especially knowing that there might be some experience to be gained in order to tackle similar situation in the future.

iv. <em>Hedging: </em>This means transferring the risk to some other business or organization. An example might be to get an insurance to manage this risk. In this case, the risk is transferred to the insurance company.

7 0
3 years ago
Read 2 more answers
HELPPP!!! ASAP *What are the purposes of a good web page?*
Brrunno [24]

I would say functional and straightforward

4 0
3 years ago
E Web Slice Gallery -
Verdich [7]

Answer:

C. Since he was hungry, she had a snack

Explanation:

So, you can say, " Claire is princes." In this "Claire happens to be the subject, " and Princes is the object. And apart from this a complete sentence must be enough to put forward a complete task. Now in C. we see complete thought is shared. Whereas in no other sentence complete thought has been revealed, and they are incomplete. And hence, the correct option is C.  

3 0
3 years ago
Help! What is this graph and what does it represent?
Lunna [17]

Answer:

Explanation:

how much something had in each month in this graph

7 0
3 years ago
Other questions:
  • Decisions 1 and 3 are both ____________ decisions because ____________________.
    9·1 answer
  • 2. Identify the diagram and define it.<br>13. What are pollen grains ?<br>4. What is an embryo?​
    12·1 answer
  • Claudia has a bachelors degree in computer information systems and she has learned to use some popular software testing tolls wh
    13·2 answers
  • Type an SQL statement into the Record Source property of the report. The statement should select all fields (*) for employees wi
    5·1 answer
  • Linda subscribes to a cloud service. The service provider hosts the cloud infrastructure and delivers computing resources over t
    10·1 answer
  • Design a program that asks the user to enter a string containing a series of single digit numbers with nothing separating them.
    7·1 answer
  • An organization is developing an authentication service for use at the entry and exit ports of country borders. The service will
    10·1 answer
  • Who can add entries to value log
    8·1 answer
  • 6
    14·1 answer
  • How do you copy a file​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!