You need a reliable network for about twenty-five computers that will be distributed across a large building. It is important that the network be relatively cheap. Which topology should you use
a mesh topology
a bus topology
a star topology

Answers

Answer 1
I'd suggest a Star topology.

In this type of topology, every node is connected to a central network device like a switch, router, or a computer. Nowadays, bus topologies are not commonly used and thus not reliable. Both star and Mesh are reliable topologies since a failure of one device does not affect the entire network. However, overall cost of Mesh topologies is way too high as compared to any other network topology making it an undesirable option.






Answer 2

Answer:

yes

Explanation:


Related Questions

The opportunity cost of earning an advanced college degree is that:

Answers

Opportunity cost is the loss of potential advantages or gain caused due to you choosing one option from a number of alternate options. The answer to the question is D. You will earn less or no money for the period you are in college. For every choice you make, there is potential benefit as well as harms by choosing that option. As far as opportunity cost regarding choosing a college is concerned, different factors need to be considered. For example:
a. Availability of Jobs: Lets just assume we have jobs available in tons b. Pay scale for such jobs which do not require advanced degrees: lets assume each such available job pays you USD 40k/year in minimum
A college degree typically requires you to stick to college for 4 years. So in these 4 years, you will be sacrificing around USD 160k in total. This is the opportunity cost of going to college. However, this assumption can fail if jobs are not available and takes time to find as well your growth prospect in terms of career growth can be hindered by not having a college degree.

To what would you compare the transport layer?

Answers

The above question has multiple choices as below

A. Data links
B. The post office
C. Driving a car
D. A train

The answer is (B) The Post Office.

In layman’s terms, transport layer is similar to the post office functions of delivering parcels and letters at the agreed delivery deadlines. It also notices any dropped info and re-transmits it.
Just like the post office, the transport layer directs messages and information between specific end users. If by mistake you write a letter to the wrong person, the letter will be returned and the postal employee will stamp it as address unknown.


A digital a0 is a recognized member of the digital community.

Answers

Wrong

Digital citizen is a recognized member of the digital community. Digital a0 on the hand is the etiquette or a set of standards for polite behavior in digital communication. A digital citizen utilizes IT in order to engage in politics, society and government.






What type of windows network model allows all the participants to be represented equally on the network with no single computer having authority or control over another?

Answers

The workgroup as a type of windows network model allows all the participants to be represented equally on the network with no single computer having authority or control over another. The workgroup is peer-to-peer local area network. 
Members of this network group can share files, printers, Internet connection. and other local network resources.

What is the first step that you should undertake when performing a visual analysis of a work of art?
1. Understand the concept behind each element and principle of design in the artwork.
2.Analyze whether the artist successfully portrayed the central message in the artwork.
3.Make a list of the different principles of design used by the artist in the artwork.
4.Use gestalt principles to interpret the artwork as a whole.

Answers

The first step in performing a visual analysis of a work of art is to analyze whether the artist successfully portrayed the central message in the artwork. It is necessary to know whether or not the central message can be understood by the audience because it implies that the art was able to deliver the essence of what it wishes to deliver. It then becomes easy to understand the other elements in the art. 

Answer:

3.Make a list of the different principles of design used by the artist in the artwork.

Explanation:

It says this in the PLATO tutorial prior to the quiz.

Data about the size and composition of a population are gathered in a survey called _____.

A. vital statistics

B. a census

C. doubling time

D. a demographic

Answers

Your answer is B. :) Hope this helps!

Answer: (B) A census

Explanation:

 The census is conducted every 10 years and it is the collection of the data about the composition and the size of the population and then prepare a survey report after gathering all the information about the population.

 This is known as census and it is important as by using the census information we determine which school, hospitals and the communities need the Federal funds.

Therefore, Option (B) is correct.

 

In a database list, fields are displayed as _____. rows columns tables records

Answers

Rows, in a static query language. Internally, it depends on the database, and could be either rows or columns.

In a database list, fields are displayed as rows. Hence, option A is correct.

What is a database list?

A database list is a collection of data that you may share with team members and anybody else you've given access to. When organizing list components, there are a number of pre-made list templates that can be utilized as a great starting point. Microsoft 365 list templates contain more information.

A brief list of letters or numbers such as the names of persons or objects list of visitors b: An official list making a list while rolling... The party approved Richard Scammon.

A database is a collection of information that has been set up to be easily updated and managed. Sales transactions, customer information, financial data, and product information are just a few examples of the types of information that can be found in data records or files.

Thus, option A is correct.

For more information about database list, click here:

https://brainly.com/question/22909814

#SPJ6

Under which menu option of a word processing program does a star appear

Answers

Star is one of the shapes. This is available under the Shape menu. To get this feature, click on Insert tab. If you click insert tab, you will get a shape menu, and then click on the arrow under shape icon which displays lots of shapes available in the word.

It contains recently used shapes in the top. If you don’t find star under the recently used shapes, you can find that below the recently used shape. Shapes contains other shapes like basic and advanced shapes.

Software that helps run the computer's hardware devices and coordinates instructions between applications is called

Answers

The question above contains multiple choices;

a.       Application

b.      Recovery

c.       Backup

d.      System

The answer is d) System software.


The system software consists of the operating systems and utility programs which are usually preinstalled. The operating system controls how a PC system functions. Utility programs, on the other hand, perform general tasks for the computer like system maintenance and file compression.








What are small applications that can be accessed over the web?

A. CAD software
B. word processing software
C. Java applets
D. Video editing software

Answers

The answer is C. Java applets.

Answer:

C. Java applets

Explanation:

Quiz verified

Which of the following is true about CSS?


A. A seperate CSS file is needed for each HTML file in a website.
B. It is a language used to customize web pages based on user preferences.
C. It is contained in a seperate file than HTML files.
D. It is used to combine formatting information and content into one single file.



In the following piece of CSS code, what is the rule?

p { color: #676767 }

A. #676767
B. color
C. p
D. p { color: #676767 }



What is the following an example of?

p { color: $676767 }


A. property
B. rule
C. selector
D. value



In the following pieces of CSS code, what is body called?


body { color: #ffffff }

A. property
B. rule
C. selector
D. value


In the following piece of CSS code, what is the property selector?

body { body: #ffffff baclground-color: #525252 font-family: arial, "lucida console", sans-serif }

A. body
B. background-color
C. color
D. font-family

Answers

CSS, short for Cascading Style Sheets, is used to define the visual presentation of web pages. It allows developers to customize layouts and styles efficiently, often across multiple pages using external stylesheets. The code examples provided highlight how CSS rules, selectors, and properties work together to style HTML elements.

Understanding CSS and Its Components

CSS stands for Cascading Style Sheets and is a language used to define the presentation of a document written in HTML or similar markup languages. It allows for the separation of document content from document presentation, including aspects like layouts, colors, and fonts. This separation is beneficial for accessibility, reusability, and flexibility in design.

Regarding the provided questions:

The answer is B. CSS is used to customize web pages based on user preferences.In the CSS code 'p { color: #676767 }', the entire line is a rule.'p { color: $676767 }' is incorrect due to a typo; assuming '$676767' is meant to be '#676767', the correct answer would be B. rule.In 'body { color: #ffffff }', 'body' is called a selector.However, there is a typo in the code 'body { body: #ffffff background-color: #525252 font-family: arial, "lucida console", sans-serif }', making it difficult to identify what's being called a property selector. Assuming it is a typo and should read 'color: #ffffff;', then 'color' would be the property.

To clarify, CSS can be included directly within an HTML document or linked as an external file. An external stylesheet can be shared across multiple HTML files, meaning a separate CSS file for each HTML document is not necessary.

The addresses used by browsers to identify the location of content on the web are called:

Answers

URLs, also known as, Uniform Resource Locators. 

URLs, or Uniform Resource Locators, are the web addresses used by browsers to locate content on the web. They consist of a protocol, domain name, and resource id. Top Level Domains (TLDs) like .com, .org, and .edu are part of the domain name that indicates the nature of the website.

The addresses used by browsers to identify the location of content on the web are known as Uniform Resource Locators (URLs). A URL is the web address that allows users to access different resources on the Internet. It can be broken down into three key parts: the protocol (http:// or https://), which indicates how the data is transmitted with the 's' signifying a secure connection, the domain name or hostname, and the resource id which includes the path to the specific resource on the server.

For example, in the URL http://www.example.com/page.html, 'http://' is the protocol, 'www.example.com' is the domain name, and '/page.html' is the resource id or path to a specific page. The Top Level Domain (TLD) like .com, .org, .edu, etc., is part of the domain that indicates the nature or the origin of the website. Every time we use a web browser, it displays the URL of a web page above the page in an address bar, enabling us to navigate the vast resources of the web.

To get revenge on the pizza parlor burning his pizza and not reimbursing him for it, David returned to the pizza parlor after-hours and set it on fire. After both the police and fire department investigated, they arrested David. Which type of crime will David be charged with

Answers

David will be charged with arson

David will be charged with a A) Felony, because Arson is under that catergory!

. List at least three image keywords you could use to search for other images for your career presentation

Answers

1. Try various keywords in your search. You might want to use a thesaurus or keyword lists on actual image pages to identify other keywords you can use in your image search.2. Get inspiration from other people. It can be helpful to see what subjects or approaches other people have used for the same keyword.3. Realize filters are your friends. Many stock photography sites have introduced advanced search filters that can speed up your image searches and also increase your success rate.
1).You can use keywords or thesaurus lists on actual image pages to identify other keywords you can use in your image search.
2). you can also search images by the subject e.g business
3)you can also use the Boolean filters which that can help you narrow down the thousands of images to a more manageable and targeted set of photos

To what would you compare the transport layer?

Answers

The above question has multiple choices as below

A. Data links
B. The post office
C. Driving a car
D. A train

The answer is (B) The Post Office.

In layman’s terms, transport layer is similar to the post office functions of delivering parcels and letters at the agreed delivery deadlines. It also notices any dropped info and re-transmits it.
Just like the post office, the transport layer directs messages and information between specific end users. If by mistake you write a letter to the wrong person, the letter will be returned and the postal employee will stamp it as address unknown.


Answer:

post office :)

Explanation:

my teacher said this was the answer

Which social network made the mistake of alienating its early adopters by deleting suspicious accounts?​?

Answers

Friendster. social media is the correct answer.

What is social network ?

A virtual community or profile site called a social network is a website which brings people to one space to talk, share ideas and interests, or make new friends.

It is a type of  collaboration and sharing  of information  in online mode even the people are far away from each other,  is known as social media.

In case of  traditional media that is created by only ten people, social media sites connect more than hundreds or even millions of different people.

It help people  to keep connected with their friends and family, it is  an easy way to find  everyone's status, life story, career,  Social networks can be used to find interesting things on the Internet as your friends and family, some advertisement.

For more details regarding social network, visit

https://brainly.com/question/14312767

#SPJ2

Your question was incomplete, hence the probable question is

Which social network made the mistake of alienating its early adopters by deleting suspicious accounts?

Ryze

Friendster

SixDegrees

Tribe.net

MySpace

When a program lets the user know that an invalid menu choice has been made, this is an example of?

Answers

The question has the multiple choices below

A) Input validation
B) output correction
C) compiler criticism
D) output validation

The answer is (A) Input validation

Also known as data validation, it is the correct and proper testing of any input supplied by an application or a user. It prevents wrongly formed data from entering the system. Applications should be able to check and validate every input entered into the system since it is hard to detect a malicious user trying to gain entry into software.










All of the following are types of goals listed in the course except?

Answers

A. Financial, because the rest seem to be health related.
phychological is the apex correct answer

What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?

Answers

The question has the below multiple choices

A) 3DES
B) RSA
C) Blowfish
D) Twofish


The answer is (C) Blowfish

Also known as the Blow-CAST-Fish, it was designed to run efficiently on 32 bit computers. Up to date no significant weaknesses have been seen. Based on Blow-CAST-Fish, it uses good features of CAST -128[6] algorithms and Blowfish [1]. Features taken from Blowfish [1] algorithm include; S-box entries which are key dependent substitution, varying key lengths of up to 448 bits and procedure of Key expansion


Once in the Word Options dialog box, to navigate to the AutoCorrect options, you will need to select _____ from the left menu.

Answers

Select Proofing option on the left.

We use AutoCorrect tab of the AutoCorrect dialog box to automatically correct common errors as you continue typing. To access this feature, you’ll need to click on the file tab, click options and then select Proofing on the word options category.






Answer:

Select Proofing option on the left.

Explanation:

What setting must be enabled to view data in demographics and interests reports?

Answers

The Question above has multiple questions as follows

a)      Content Grouping

b)       Advertising features

c)        User permissions on the view

d)       In-Page Analytics

Answer is b) Advertising feature.

You can enable the demographics and interests reports from the admin or reporting tab. To enable from the admin tab, you should be signed in to your analytics account and then click admin. Go to account and property. In the property column, click on the property settings and then go to advertising features and set the Enable Demographics and Interests Reports on. Click Save


To make a notation to text in a document to address later or for another person to review, use the _____ feature.

Answers

To make a notation to text in a document to address later or for another person to review, use the comment feature.

HURRYYY A friend of yours has E-mailed their English paper to you so that you can proofread it. Explain the tools you would use to add your comments, and describe why this would be beneficial to your friend.

Answers

I would use text tool, I would also use one note, and with that you and your friend can help make it better.

Which is the strongest reason to create a powerful and impressive résumé?

Answers

strongest treason to create a powerful and impressive résumé would be because you're representing yourself. You are showing others what a great hard worker you are. You're able to show other what exactly your skills are. It's important that it should be powerful and impressive in order to be called in to be hired by many companies, stores, etc.

Using switches, routers, internal firewalls, and other devices, you can restrict network traffic with a ____________________, which limits what and how computers are able to talk to each other.

Answers

MAC addresses are "burnt in addresses" unique to the network device, not your PC. 
If you change your network interface card then you have a new MAC address. 

What might be one reason why a stock becomes more valuable over time?
A. The industry is growing
B. The company is well-managed.
C There is a lot of demand for the product.
D. All of the above.

Answers

A stock is a term used to describe the certificates you have when you own a company. Stocks are one of the high favorites when it comes to investments, because though they are quite risky, they tend to become extremely valuable over time. It can be said that the reason for this is because the industries that have high value now have become bigger over time. Another reason is because the company is well-managed, and stability is a good lure for many investors, thus rising the value of the stocks. When there are many demands for the product, the company stocks also tend to be more valuable over time.

Thus the answer to the question above is (D) all of the above.

A stock can become more valuable over time if the industry is growing, the company is well-managed, and there is high demand for its product. The Correct Option Is D. All of the above.

One reason why a stock becomes more valuable over time is that the industry is growing. As an industry expands, companies within that sector are likely to see increased profits, which attracts more investors.

Additionally, a company being well-managed can lead to better strategic decisions and operational efficiencies, boosting profitability and stock value. High demand for a company's product also increases revenue, making the stock more attractive to investors. Therefore, the correct answer is D. All of the above.

why should a coworker sign off as a witness for an engineering notebook

to double check the work
many engineers skip this essential step
because fraud is common in engineering
this step is needed only for inexperienced engineers

Answers

The answer is (A) To double check the work.

A coworker or a colleague should go over the entries and confirm the events and facts on each page and then date or sign as the witness in the specified location. Apart from the witness, no one else should write on an engineer’s notebook.  




In a solenoid valve system if the voltage on the coil is 118 VAC and a continuity test of the solenoids coil measures 80 ohms yet the solenoid will not allow water flow the most likely cause of failure is a

Answers

If you choices are the following: 
A. broken spring.
B. stuck plunger.
C. faulty coil.
D. cracked disk

Then the answer is B. stuck plunger. A plunger is a part of a device or mechanism that works with a plunging or thrusting movement.

Your friends parents are worried about going over their budget for the month. Which explains would you suggest is not a need.

A. Groceries
B. Rent payment
C. Cable survive
D. Car insurance

Answers

Hey there!

Your friends parents are worried about going over their budget for the month.
Your answer is option C, you do not need Cable survive if you are stressing with your money.
TV is not necessary if you're worrying about going over your budget but groceries are good because you need food to stay healthy, rent is good to have a home to live in, and car insurance is good to be able to drive places.

Final answer:
Option C.

Hope this helps you.
Have a great day!

At what layer of the osi model do the 802.11 standards vary?

Answers

The 802.11 standards are defined from IEEE and represent a set of specifications for the Media Access Control (MAC) and physical layer for the Wireless Local Area Network (WLAN) networks. The WLAN communication networks operate in the 900 MHz and 2.4, 3.6, 5, and 60 GHz frequency bands.
The 802.11 standards vary at the physical layer of the OSI model, because there it is defined at which frequency band the network operates.
 
Other Questions
use the babylonian method to approximate square root of 24 to the nearest hundredth. Yo ________mi tarea maana. Estoy muy cansada hoy. Question 21 options:comerharhacercomEn el futuro los alumnos ______________ solamente en tabletas. Question 20 options:estudiarnestudinviviremosviven Use the formula A=bh , where A is the area, b is the base length, and h is the height of the parallelogram, to solve this problem. A sign on the side of a van is in the shape of a parallelogram. The area of the sign is 330 square inches. The base of the sign is 22 inches long. What is the height of the sign? Enter your answer in the box.--------[ ]-------- which two forms of electromagnetic energy mostly passes through the atmosphere to Earth's surface The records in a database table are generally visualized as ________.a. fieldsb. relationshipsc. rowsd. filese. attributes What video game company made the biggest early impact on the home video game industry Is it possible for a composite number to have more than one prime factorization? Yes. I'm I right @dirtydan667 Find sin q if q is an angle in standard position and the point with coordinates (4, 3) lies on the terminal side of the angle. I don't understand what I'm suppose to be doing here. are sea slugs slowly becoming what they eat Approximately how much did the United States owe to other nations at the end of the Revolutionary War? A) twenty million B) twelve million C) two millionD) nothing Jane is planting flowers in her garden. She planted 8 flowers on Saturday and 10 on Sunday. So far she planted 2/5 of her flowers. How many flowers does she have total? The president is managing a war that is not going well. nevertheless, he refuses to withdraw troops, arguing that doing so would waste the billions of dollars spent and thousands of lives lost fighting the war. the president's line of reasoning illustrates: The two basic forms of literature are fiction and nonfiction.TrueFalse Fatima generalizes that all men are irresponsible players, cheaters, and liars. when it comes to men, fatima may be applying ________: negative beliefs about individuals based solely on their membership in a group. Read the poem which follows and select the emotions and imagery of an outsider's perspective of death that also appear in The Sweet Hereafter. "Every Death Is Magic from the Enemy to Be Avenged" by Brooks Haxton When fever burned the last light out of my daughter's eyes, I swore to find and kill the ones to blame. Men must mount the long boat in the dark with spears. At dawn, where the flowering spicebush hid my scent, I crouched. A young wife, newborn slung across her chest, came first for spring water. She stooped. My god, for vengeance, spoke her secret name inside my ear. Her god stepped back with no scream, his right hand at his mouth, the knuckles clenched between the pointed teeth. - The idea of secrets being told -The idea of assigning blame - The image of the flowering bush -The image of the pointy teeth - The image of the newborn Addition of a benzopyrene adduct is the result of what type of reaction? What is the exact volume of the sphere? 36.868 m 94.46 m 147.456 m 463.01 m Sphere with dotted line extending from middle point of sphere to edge. Line is labeled four and eight-tenths meters. the record for a ski jump is 180 m set in 1989. Assume the jumper comes off the end of the ski jump horizontally and falls 90 m vertically before contacting the ground . what was the initial horizontal speed of the jumper? A computer program reduces the length of each side of an 8'' by 8'' square photograph by 25%. What is the area, in square inches, of the reduced photo? The quiver tree grows in southern Africa which of the following plant adoptions is likely to prevent these trees from dying out due to Rising Desert temperatures?Releasing a black powdery substance on their trunk shifting they're growing range towards the equator shifting they're growing rage towards the poles limiting seed dispersal to nearby locations