1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notka56 [123]
2 years ago
7

ANSWER ASAP!!! 12 POINTS!!!!! RIGHT ANSWERS ONLY

Computers and Technology
2 answers:
suter [353]2 years ago
8 0

Answer:

B.

Explanation:

lana [24]2 years ago
3 0

Answer:

1. B. A ring network can be wider than most topologies but not as wide as a mesh network.

2. D. In a star network topology, when one node goes down, the whole network goes down, whereas a ring network would not go down.

Explanation:

1. A ring network is a network structure in which each node is connected to exactly two other nodes, forming a single continuous signal channel - a ring. Data is passed from node to node, with each node handling one packet at a time.

A mesh network is a network in which devices (or nodes) are linked together and branch off of one another. These networks are designed to transport data efficiently between devices and clients. They assist organizations in maintaining a continuous connection across a physical place.

Mesh network topologies allow information to pass between connected nodes via numerous paths. This method improves the network's resiliency in the event of a node or connection failure. Multiple routers, switches, and other devices that act as nodes may be used in larger mesh networks. Hundreds of wireless mesh nodes can be found in a mesh network, allowing it to cover a huge region.

A computer network is a collection of devices that are linked together in order to communicate. Hubs, switches, routers, printers, computers, servers, and other devices make up the network. A network topology is a diagram of the network's connected components. There are several network topologies, including star and ring.

In a ring topology, the devices are connected in a ring-like fashion. The first device establishes a connection with the second. That gadget establishes a connection with the other. Similarly, all of the devices connect, and the last devices join back to the first, making a ring-like structure. As a result, each gadget is connected to two others.

The mesh topology has a one-of-a-kind network design in which every computer on the network is connected to every other computer on the network. It establishes a P2P (point-to-point) connection between all network devices. It has a high amount of redundancy, which means that even if one network cable fails, data will still be able to reach its destination.

2. The central site is critical in star topology; if it fails, all of the connections fail. The performance of the connection is determined by the performance of the central hub. In a star topology, two nodes may be physically separated from each other; however, they must communicate through a central node (Eboli, 2019). Ring network, failure of one node won't affect the entire network. It is simple to manage and has a low risk of collision, but it is dependent on all nodes being powered up and fully operational.

You might be interested in
Explain steps in creating a main document for from letter. <br>​
Paladinen [302]

Answer:

To create a new database, follow these steps:

1.In the Mail Merge task pane, click Next: Select Recipients.

2.Click Type a new list.

3.Click Create. ...

4.After you type the information for a record, click New Entry to move to the next record. ...

5.In the New Address List dialog box, click OK

4 0
3 years ago
A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.
ratelena [41]

Answer:

a) Generate a new public and private key

Explanation:

You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.

The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.

Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.

8 0
3 years ago
What are the advantages and disadvantages of the simulated link strategy?
amid [387]

Answer:

The advantage of the simulated link strategy are:

  • It is easily able to provide the practical feedback to the customers and users while designing the whole system. It also determine the efficiency and the correctness of the design in the stimulated link strategy.
  • In the stimulated link strategy, the sharing and delivering of the data and information is done efficiently without any occurrence of error and interrupt. It is also high flexible technique.

The disadvantage of the simulated link strategy are:

  •   The simulated link strategy is flexible but it is not standardization and also it required more good concept.
  •  This technique is expensive and it is not readily available as it always require validation process.

3 0
3 years ago
What kind of device is a cpu input or output?
Rina8888 [55]
Correct answer: Neither

The CPU<span> is also known as the </span>processor<span> or microprocessor. The </span>CPU<span> is responsible for executing a sequence of stored instructions called a program. This program will take </span>inputs<span> from an </span>input<span> device, process the </span>input<span> in some way and </span>output<span> the results to an </span>output<span> device.</span> It is neither an input nor an output device, but it is usually connected to both kinds of devices.

Output devices like your monitor, speaker, and printer does not process anything fo it to be categorized as a processing device like your CPU and so as input devices like your mouse, microphone, and keyboard.

3 0
3 years ago
Edhesive intro to CompSci Test 7 answers pls
algol13

Answer:

nothing

Explanation:

nothing

6 0
3 years ago
Other questions:
  • Press the ____ key(s) to erase one character to the left of the insertion point.
    10·2 answers
  • ________ computers are specially designed computer chips that reside inside other devices, such as a car. Select one: A. Tablet
    11·2 answers
  • Objects falling through air experience a type of friction called.. A.terminal velocity B.air resistance C.rolling friction
    8·1 answer
  • Why is a networked system a benefit?
    7·1 answer
  • Which of the following is a rule of thumb for cell phones or smartphone etiquette ?
    12·1 answer
  • Analyze the following code. // Program 1: public class Test { public static void main(String[] args) { Object a1 = new A(); Obje
    5·1 answer
  • IOS jail broken or Android unrooted which is better to hack with
    6·1 answer
  • QUESTION 16
    14·1 answer
  • Help please
    13·2 answers
  • What will the following code display? int numbers[4] = { 99, 87 }; cout &lt;&lt; numbers[3] &lt;&lt; endl; a. 87 b.0 d. 34. What
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!