1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notka56 [123]
1 year ago
7

ANSWER ASAP!!! 12 POINTS!!!!! RIGHT ANSWERS ONLY

Computers and Technology
2 answers:
suter [353]1 year ago
8 0

Answer:

B.

Explanation:

lana [24]1 year ago
3 0

Answer:

1. B. A ring network can be wider than most topologies but not as wide as a mesh network.

2. D. In a star network topology, when one node goes down, the whole network goes down, whereas a ring network would not go down.

Explanation:

1. A ring network is a network structure in which each node is connected to exactly two other nodes, forming a single continuous signal channel - a ring. Data is passed from node to node, with each node handling one packet at a time.

A mesh network is a network in which devices (or nodes) are linked together and branch off of one another. These networks are designed to transport data efficiently between devices and clients. They assist organizations in maintaining a continuous connection across a physical place.

Mesh network topologies allow information to pass between connected nodes via numerous paths. This method improves the network's resiliency in the event of a node or connection failure. Multiple routers, switches, and other devices that act as nodes may be used in larger mesh networks. Hundreds of wireless mesh nodes can be found in a mesh network, allowing it to cover a huge region.

A computer network is a collection of devices that are linked together in order to communicate. Hubs, switches, routers, printers, computers, servers, and other devices make up the network. A network topology is a diagram of the network's connected components. There are several network topologies, including star and ring.

In a ring topology, the devices are connected in a ring-like fashion. The first device establishes a connection with the second. That gadget establishes a connection with the other. Similarly, all of the devices connect, and the last devices join back to the first, making a ring-like structure. As a result, each gadget is connected to two others.

The mesh topology has a one-of-a-kind network design in which every computer on the network is connected to every other computer on the network. It establishes a P2P (point-to-point) connection between all network devices. It has a high amount of redundancy, which means that even if one network cable fails, data will still be able to reach its destination.

2. The central site is critical in star topology; if it fails, all of the connections fail. The performance of the connection is determined by the performance of the central hub. In a star topology, two nodes may be physically separated from each other; however, they must communicate through a central node (Eboli, 2019). Ring network, failure of one node won't affect the entire network. It is simple to manage and has a low risk of collision, but it is dependent on all nodes being powered up and fully operational.

You might be interested in
Which of the following class definition defines a legal abstract class Group of answer choices public class Rectangle abstract {
valkas [14]
<h2>Question</h2>

Which of the following class definition defines a legal abstract class Group of answer choices

(a)

public class Rectangle abstract {

   public abstract double findArea ( );

   

}

(b)

public abstract class Rectangle {

   public abstract double findArea ( );

   

}

(c)

public class Rectangle {

   public abstract double findArea ( );

   

}

(d)

public class abstract Rectangle {

   public abstract double findArea ( );

   

}

<h2>Answer:</h2>

(b)

public abstract class Rectangle {

   public abstract double findArea ( );

}

<h2>Explanation:</h2>

When a class is declared with the abstract keyword, the class is called an abstract class. Abstract classes cannot be instantiated and may include one or more abstract methods. If a class contains an abstract method, then it (the class) must be declared abstract.

In Java, abstract classes are defined using the following format:

<em>[access_modifier]</em> abstract class <em>[name_of_class]</em>

[access_modifier] specifies the access modifier of the class which could be public, private, e.t.c

abstract is the keyword that specifies that the class is an abstract class.

class is a keyword used for defining classes

name_of_class specifies the name of the class.

The only option that fulfils this format is <em>option b</em> where;

(i) The access modifier is public

(ii) The name of the class is Rectangle

Option a is not correct because the <em>abstract</em> keyword is supposed to come before the <em>class</em> keyword.

Option c is not correct because the keyword <em>abstract</em> is missing. In other words, the class must be declared abstract since it contains abstract method findArea();

Option d is not correct because the <em>abstract</em> keyword is supposed to come before the <em>class</em> keyword.

7 0
2 years ago
#A year is considered a leap year if it abides by the #following rules: # # - Every 4th year IS a leap year, EXCEPT... # - Every
lara [203]

Answer:

To check if the year comes under each 100th year, lets check if the remainder when dividing with 100 is 0 or not.

Similarly check for 400th year and multiple 0f 4. The following C program describes the function.

#include<stdio.h>

#include<stdbool.h>

bool is_leap_year(int year);

void main()

{

int y;

bool b;

 

printf("Enter the year in yyyy format: e.g. 1999 \n");

scanf("%d", &y);     // taking the input year in yyyy format.

 

b= is_leap_year(y);  //calling the function and returning the output to b

if(b==true)

{

 printf("Thae given year is a leap year \n");

}

else

{

 printf("The given year is not a leap year \n");

}

}

bool is_leap_year(int year)

{

if(year%100==0)   //every 100th year

{

 if(year%400==0)   //every 400th year

 {

  return true;

 }

 else

 {

  return false;

 }

}

if(year%4==0)  //is a multiple of 4

{

 return true;

}

else

{

 return false;

}

}

Explanation:

Output is given as image

5 0
3 years ago
Hank is the network administrator responsible for managing the web server cluster for an e-commerce company. He’s worried about
statuscvo [17]

Answer: ....

If one load balancer fails, the secondary picks up the failure and becomes active. They have a heartbeat link between them that monitors status. If all load balancers fail (or are accidentally misconfigured), servers down-stream are knocked offline until the problem is resolved, or you manually route around them.

Explanation:

Load balancing is a technique of distributing your requests over a network when your server is maxing out the CPU or disk or database IO rate. The objective of load balancing is optimizing resource use and minimizing response time, thereby avoiding overburden of any one of the resources.

The goal of failover is the ability to continue the work of a particular network component or the whole server, by another, should the first one fail. Failover allows you to perform maintenance of individual servers or nodes, without any interruption of your services.

It is important to note that load balancing and failover systems may not be the same, but they go hand in hand in helping you achieve high availability.

3 0
2 years ago
What is the difference between a method and a function? In what ways are they similar? Why do you think Python makes a distincti
makvit [3.9K]

Answer:

A method in python is somewhat similarto a function, except it is associated with object/classes. Methods in python are very similar to functions except for two major differences. The method is implicitly used for an object for which it is called. The method is accessible to data that is contained within the class.

5 0
3 years ago
Angular where to set httpclient root url.
Trava [24]

Answer:

start with what you know

Explanation:

you can learn a lot more

8 0
2 years ago
Other questions:
  • A custom date format set for a date/time field that contains the symbols mmm/dd/yy would display the date as ____.
    12·1 answer
  • Given 3 floating-point numbers. Use a string formatting expression with conversion specifiers to output their average and their
    14·1 answer
  • For your biology class, you have taken a number of measurements for a plant growth experiment. You wish to create a chart that s
    7·2 answers
  • The programming interface between an application program and the dbms is usually provided by the
    13·1 answer
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • Which picture should i put as my profile picture.
    15·2 answers
  • Anyone know how to delete that I need ASAP
    13·1 answer
  • Biểu diễn cây sau bằng mảng một chiều
    12·1 answer
  • Decision support systems help managers use structured data to identify problems and find solutions to business-related problems.
    10·1 answer
  • Sara wants to set up her lights to turn on when she arrives home. She has heard that she might be able to do this using IoT. Wha
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!