1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
m_a_m_a [10]
3 years ago
11

Mr. Hicks is setting up a wiiſed office network for 10 computers. He needs to use a network topology

Computers and Technology
1 answer:
Viefleur [7K]3 years ago
5 0

Answer:

C. Mesh

Explanation:

Each device will be connected to the other 9 devices, making it the best topology to use.

Hope this helps!

You might be interested in
You have been hired as a security administrator. While analyzing your organization's personnel policies, you notice the presence
Lorico [155]

To deal with presence of multiple orphaned accounts as a security administrator in an organization, the user accounts should be disabled.

<h3>What is orphaned accounts?</h3>

The orphaned accounts are the accounts which do not have any valid business owner but provide the access to the services and corporate systems. One best way to deal with such account is to disable the user account.

Steps to deal with orphaned accounts-

  • Using the automated provisioning and deprovisioning can save the
  • Control the accounts with micro-certification.
  • Regular check of account to prevent the hidden access risk.

You have been hired as a security administrator. While analyzing your organization's personnel policies, you notice the presence of multiple orphaned accounts.

In such case, one should disable these accounts.

Thus, to deal with presence of multiple orphaned accounts as a security administrator in an organization, the user accounts should be disabled.

Learn more about the orphaned accounts here:

brainly.com/question/11211623

#SPJ1

8 0
2 years ago
Solve the equation w - 2 = -3<br><img src="https://tex.z-dn.net/?f=w%20%3D%20%20%20-%20%20%5Cfrac%7B3%7D%7B2%7D%20" id="TexFormu
Andreyy89
Heres my answer w= -1
4 0
3 years ago
Can somone give me advice!
DENIUS [597]

Answer:

if you are scared just do it through text and btw life is short go for it

Explanation:

and if he says no there is plenty of more people out there

3 0
3 years ago
Read 2 more answers
1.      To reference a style sheet across multiple HTML pages, how would you define your CSS?​
lawyer [7]

Answer:

If you want to make a footer that attaches to the bottom of the user's window and not just the bottom of the page, what two properties would you use? Q . The ------------- shorthand property sets all the border properties in one declaration.

Explanation:

7 0
3 years ago
A forwarded message ____.
nadya68 [22]

Answer:

C. does include the email addresses of previous recipients and senders

Explanation:

When using email services, you can see functions such as send, forward, reply, reply all. For forwarded messages, when a user tries to forward a message to a recipient, it does not include the email address of previous recipient and senders because the aim of forwarding is to send to new recipients and hence it does not have anything to do with previous senders or recipients.

4 0
3 years ago
Other questions:
  • When considering server consolidation, plan on running ___________ vCPUs per core.a. 1 to 2b. 3 to 4c. 4 to 6d. 6 to 8
    7·1 answer
  • Determine the number of bytes necessary to store an uncompressed RGB color image of size 640 × 480 pixels using 8, 10, 12 and 14
    11·1 answer
  • Why are rules required for a number system to be useful?
    10·2 answers
  • Operating systems such as Microsoft Windows use a specific character before a file extension to separate it from the filename. W
    9·2 answers
  • Help please appreciate it
    11·1 answer
  • 5. Many vehicles have indicator lights telling you when your
    7·2 answers
  • Which statement describes earthquakes?
    6·1 answer
  • You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. T
    6·1 answer
  • What is a Forloop and what is it used for?
    7·2 answers
  • You want to read input from the user to know how many apples they would like
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!