1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notka56 [123]
2 years ago
7

ANSWER ASAP!!! 12 POINTS!!!!! RIGHT ANSWERS ONLY

Computers and Technology
2 answers:
suter [353]2 years ago
8 0

Answer:

B.

Explanation:

lana [24]2 years ago
3 0

Answer:

1. B. A ring network can be wider than most topologies but not as wide as a mesh network.

2. D. In a star network topology, when one node goes down, the whole network goes down, whereas a ring network would not go down.

Explanation:

1. A ring network is a network structure in which each node is connected to exactly two other nodes, forming a single continuous signal channel - a ring. Data is passed from node to node, with each node handling one packet at a time.

A mesh network is a network in which devices (or nodes) are linked together and branch off of one another. These networks are designed to transport data efficiently between devices and clients. They assist organizations in maintaining a continuous connection across a physical place.

Mesh network topologies allow information to pass between connected nodes via numerous paths. This method improves the network's resiliency in the event of a node or connection failure. Multiple routers, switches, and other devices that act as nodes may be used in larger mesh networks. Hundreds of wireless mesh nodes can be found in a mesh network, allowing it to cover a huge region.

A computer network is a collection of devices that are linked together in order to communicate. Hubs, switches, routers, printers, computers, servers, and other devices make up the network. A network topology is a diagram of the network's connected components. There are several network topologies, including star and ring.

In a ring topology, the devices are connected in a ring-like fashion. The first device establishes a connection with the second. That gadget establishes a connection with the other. Similarly, all of the devices connect, and the last devices join back to the first, making a ring-like structure. As a result, each gadget is connected to two others.

The mesh topology has a one-of-a-kind network design in which every computer on the network is connected to every other computer on the network. It establishes a P2P (point-to-point) connection between all network devices. It has a high amount of redundancy, which means that even if one network cable fails, data will still be able to reach its destination.

2. The central site is critical in star topology; if it fails, all of the connections fail. The performance of the connection is determined by the performance of the central hub. In a star topology, two nodes may be physically separated from each other; however, they must communicate through a central node (Eboli, 2019). Ring network, failure of one node won't affect the entire network. It is simple to manage and has a low risk of collision, but it is dependent on all nodes being powered up and fully operational.

You might be interested in
Please Help Me!!!!!!!!!!!!!
My name is Ann [436]

Explanation:

a magazine cause it helps put out commercial

3 0
3 years ago
System software can be described as end-user software and is used to accomplish a variety of tasks.
irina [24]
Your answer is false :)

I hope this helps! :)
8 0
3 years ago
Which of the following allows data to coordinate activity between devices? Select one: a. Address bus b. Collisions c. Data bus
AnnyKZ [126]

Answer:

The correct option is D: Control Bus

Explanation:

A control bus is usually used by the Central Processing Unit to communicate with all the devices that are connected or contained within a computer. This connections are usually done via physical connections such as printed circuits or cables. It is also called a Computer bus and helps in coordinating activities between the connected devices.

5 0
3 years ago
Which behavior could be acceptable at a classical concert as well as at a ball game? standing for an exceptional performance che
Lady_Fox [76]
Standing for an exceptional performance would be normal "acceptable" in both scenarios.
7 0
3 years ago
Read 2 more answers
A blood bank maintains two tables - DONOR, with information about people who are willing to donate blood and ACCEPTOR, with info
Kipish [7]

Answer:

The sql query is given below.

Since we need to count of males and females for a particular blood group, we put xxx for the blood group.

SELECT COUNT(SELECT DID FROM DONOR WHERE GENDER LIKE "M%") as Male_Donors,

COUNT(SELECT DID FROM DONOR WHERE GENDER LIKE "F%") as Female_Donors

FROM DONOR

WHERE BG = xxx;

Explanation:

The clauses in the query are as follows.

1. SELECT: all the columns required in the output are put in this clause.

2. FROM JOIN ON: the table(s) from which the above columns are taken are put in this clause.

3. WHERE: any condition required to filter the output is put in this clause.

The query is explained below.

1. Find the number of male donors. Number of anything can be found using COUNT() function. A query is required since gender is included in deciding the type of donor.

2. The query is defined to find number of male donors as follows.

COUNT( SELECT DID FROM DONOR WHERE GENDER LIKE "M%"; )

3. In the previous query, LIKE operator is used since it is not defined what value is stored for male donors.

4. Similarly, the query to find the number of female donors is formed.

COUNT( SELECT DID FROM DONOR WHERE GENDER LIKE "F%"; )

5. Next, the final query is formed as follows.

SELECT: both COUNT() functions will come here.

FROM: table name

WHERE: specific blood group will be put here

GROUP BY: this clause is optional and is not used in this query.

HAVING: this clause is optional and is not used in this query.

6. The query after putting all clauses is shown below.

SELECT COUNT(SELECT DID FROM DONOR WHERE GENDER LIKE "M%"),

COUNT(SELECT DID FROM DONOR WHERE GENDER LIKE "F%")

FROM DONOR

WHERE BG = xxx;

7. Alias is used in the above query for each column to get the final query.

SELECT COUNT(SELECT DID FROM DONOR WHERE GENDER LIKE "M%") as Male_Donors, COUNT(SELECT DID FROM DONOR WHERE GENDER LIKE "F%") as Female_Donors

FROM DONOR

WHERE BG = xxx;

7 0
3 years ago
Other questions:
  • what is a massive online storage that allows for access by any Internet connected device running a web browser and is used for l
    7·1 answer
  • What's the best way to change the font size of all your notes pages at once?
    6·1 answer
  • If you have a charger that’s not from Apple, then could that damaged your iPhone or not?
    5·1 answer
  • Design and implement an application that reads a sequence of up to 25 pairs of names and postal (ZIP) codes for individuals. Sto
    9·1 answer
  • Which operating system is a version of Linux?​
    13·1 answer
  • Jason Has A Science Video Project, As He Creats His Project, He Saves, Then Comes Back A Minute Later. The File Is Now Unreadabl
    8·2 answers
  • In general, smartphones do NOT hold as much personal information as tablets.
    11·1 answer
  • When clients connect to a web server using the _________ method, the server logs them on using the iusr account, by default?
    14·1 answer
  • In one to two sentences, describe how you would add a new slide to your presentation.
    11·2 answers
  • Edhesive in JAVA Write a method that takes a String parameter. If the String has a double letter (i.e. contains the same letter
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!