Challenge #3: Create a network that keeps everyone connected even if one of the lines is cut Insert as many lines as needed

Answers

Answer 1

Answer:

To create a redundant computer network, The star network topology is adopted.

Explanation:

Note that topology is not a type of network but a top view of how the network looks like or is connected.

To make a network redundant, interconnect every computer to one another in the network, so even when a line or an ethernet cable ( the connector) makes, there is no loss of connection.

This form of network is not recommended for large computer networks as it would result in confusion due to excess connection cables running in the network.


Related Questions

A peripheral can be used to tell a computer to complete a specific task.
A) True
B)False

Answers

Answer:

A. true

Explanation:

because you can complete it without it mistakes if your using an computer but if you use an paper you will make mistakes over and over

Why can the internet keep growing as more devices are added without decrease in performance?

Answers

Answer:

Explanation:

There may be many reasons why your internet speed is slow. Internet use requires a reliable connection between your device and the destination, which may be a server that is physically located on the other side of the world.Your connection to that server could pass through hundreds of devices on its journey. Each one of these is a potential failure, or weak point. If one point along this path isn’t functioning optimally, this can significantly affect your internet experience.

There are many reasons your Internet connection might appear slow. It could be a problem with your modem or router, Wi-Fi signal, signal strength on your cable line, devices on your network saturating your bandwidth, or even a slow DNS server. These troubleshooting steps will help you pin down the cause.

Collisions occur when one output is mapped to two inputs.

A. True
B. False

Answers

Answer:

true very true very true

Answer:

False

Explanation:

I honestly just guess ngl

but i believe it's right ;0

Please Help!

Choose all items that are characteristics of placing nested elements on a new line, using indentation.


A) makes HTML errors difficult to find

B) not required by a web browser

C) can cause web page display errors

D) makes HTML analysis and repair easier

E) done automatically by HTML authoring software

Answers

Answer:

Its B,D,E

Explanation:

Got it right on e2020

Answer:

B). not required by a web browser

D). makes HTML analysis and repair easier

E). done automatically by HTML authoring software

Btw cause this class can be a pain here are the answers to the rest of the assignment.

Slide 7/12:

The missing element is

C). <p></p>

Slide 9/12:

The missing tag is:

B). an end (closing) a tag

Slide 12/12:

The missing character is

D). an angle bracket

Explanation:

I just did the Part 3 on EDGE2022 and it's 200% correct!

Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)

BRAINLIEST

When using design templates, these elements will be determined for you.
bullets
background
color scheme
content
title
font

Answers

Answer:

background

color scheme

font

I think thats all

Explanation:

Please give me Brainly

When using design templates, the elements that will be determined for you are color scheme and background. The correct options are b and c.

What is designing a template?

The template is creating a document that has a copy of itself. Design templates are ready-made layouts and written materials that can be altered.  For example, if you have a template of office content, then you can use it for another word document. You don't have to start from scratch.

In order to maintain consistency among users and media, templates are frequently created to adhere to certain rules or specifications. You can make new templates for later use, or utilize pre-designed templates from template libraries and websites.

Therefore, the correct options are b, background, and c, color scheme.

To learn more about template, refer to the link:

https://brainly.com/question/28193778

#SPJ2

Which of the following You tubers uses the word "flip" as a curse word

A. Unspeakable
B.09Sharkboy
C. Moosecraft
D. All of the above

First correct answer get brainiest!

Answers

All of the above cause it’s fliped

Which item cannot be inserted into a header or footer of a document?

Answers

Answer:

All the above items can be inserted into either a header or a footer.

Please mark brainliest!

The items that cannot be inserted into a header or footer of a document is all the above items can be inserted into either a header or a footer. The correct option is d.

What is a header or footer?

A document is a type of information that can be stored electronically. Page numbers are generated automatically. Tables with columns and rows, pictures, shapes, and clipart can all be inserted into a document's header or footer. As a result, all of the items listed above can be inserted into the header or footer.

A header is text at the top of a page, whereas a footer is text at the bottom, or foot, of a page. Typically, these spaces are used to input document information such as the document's name, chapter heading, page numbers, creation date, and so on.

Therefore, the correct option is d, All the above items can be inserted into either a header or a footer.

To learn more about the header or footer, refer to the link:

https://brainly.com/question/4637255

#SPJ2

The question is incomplete. Your most probably complete question is given below:

Automatic page numbers

Tables with columns and rows

Pictures, shapes, and clipart.

All the above items can be inserted into either a header or a footer.

What piece of equipment changes the signal from the television camera into an electronic signal?
receiver
transducer
transponder

Answers

Answer:

Transponder

Explanation:

Transponder - a device for receiving a radio signal and automatically transmitting a different signal.

Answer:

transponder isnt correct i took the quiz its one of the other 2

Explanation:

the correct answer is transducer

How did New York Governor Hugh Carey handle Sostre’s situation?

Answers

Answer:

The governor found a way to free Sostre without assessing whether or not he was guilty or innocent of drug crime in buffalo.

Explanation:

Answer:

The governor found a way to free Sostre without assessing whether or not he was guilty or innocent of drug crime in buffalo.

Explanation:

correct on e2020 Dawg

What can you do to prevent damage to a computer? Check all of the boxes that apply.

Keep your computer in a temperature- controlled room.

Tie cords in knots so they are shorter.

Dust your computer only when you see a buildup of dust.

Use surge protectors when you are away from home or school.​

Answers

Answer:

temperature-controlled room and surge protectors

Explanation:

Answer:

Keep your computer in a temperature- controlled room

Dust your computer only when you see a buildup of dust

Use surge protectors when you are away from home or school

Explanation:

just good

What is the difference between soft copy output devices and hard copy output devices​

Answers

the output printed on the paper is called hardcopy output. some examples are printer and plotter.

the output produced on display screen and audio sound is called soft copy output. some examples are moniter and speaker.

Which function will find the difference of 15 and 3 and return 12 when the main part of your program has the following line of code?

answer = subtract(15,3)

def Subtract(numA, numB):
return numA - numB

def Subtract(numA, numB):
return numB - numA

def subtract(numA, numB):
return numA - numB

def subtract(numA, numB):
return numB - numA

Answers

Answer:def subtract(numA, numB):

   return numA - numB

Explanation:

i got the right answer but i was willing to get it wrong for the right anwser for you

The function that will find an accurate difference of 15 and 3 and return 12 when the main part of your program has the following line of code is as follows:

def subtract(numA, numB):

       return numA - numB

Thus, the correct option for this question is C.

What is the significance of the output of the program?

The significance of the output of the program is understood by the fact that it delivers some values or concepts to the user with respect to the instruction he/she is given to the computer for processing. The output of the program is very specific in nature.

According to the question, you have to assume the value of number A as 15 and number B as 3. So, when you find the difference between these numbers, you get an output of 12.

You must follow the process as follows while framing a program:

def subtract(numA, numB):

         return numA - numB

Therefore, the correct option for this question is C.

To learn more about Output of a program, refer to the link:

https://brainly.com/question/18079696

#SPJ2

Before he buys a new smartphone, Tim can best use data to

evaluate which phone he should get.
convince himself he wants a phone.
discredit others’ opinions on his phone choice.
recognize problems that all phones have.

Answers

It’s A or the first one, kinda like process of elimination, the second and third one are obviously eliminated first so then it’s just between a and d. But a makes more sense as to he has to buy one either way

Answer:

A.) Evaluate which phone he should get

Explanation:

Edge2020

How can I get coding with no experience?

Answers

With "no" experience? With help, yes! Although with nothing, it would be almost impossible.

Hi guys, Im making a game. I want to make a collision event, but what is the code for making the wall and the box collide. I really need a quick and correct response. Pls support.

Answers

Answer:

i think its 3337

Explanation:

Which of this isn't one of the three types of cryptograph?

A. Vegenere
B. Symmetric
C. Asymmetric
D. Hashing

Answers

Answer:

A. Vegenere

Explanation:

I think it's spelled Vigenère, I might be wrong.

The three types of cryptograph are:

Symmetric Key Cryptography (Private/Secret Key Cryptography)

Asymmetric Key Cryptography (Public Key Cryptography)

Hash Function

Which statement is true? Select 3 options.

A function must have a return value.
A function can use variables as parameters.
The definition of a function must come before where the function is used.
A function can have more than one parameter.
The definition of a function can come before or after it is used.

Answers

Answer:

A,C, AND E

Explanation:

i got it wrong for the anwser

The statements that are true are as follows:

A function must have a return value.The definition of a function must come before where the function is used.The definition of a function can come before or after it is used.

Thus, the correct options for this question are A, C, and E.

What is Function?

A Function may be defined as a kind of expression, rule, or law that significantly determines a relationship between one variable which is known independent variable and another variable which is known as the dependent variable.

Each and every function must possess a return value. Apart from variables, there are several other parameters on which functions have to be worked on. So, the definition of a function must exist prior to its utilization. However, the actual definition of function may also exist after its utilization as well.

Therefore, the correct options for this question are A, C, and E.

To learn more about Functions, refer to the link:

https://brainly.com/question/22340031

#SPJ2

Anyone have an answer for 4.9 lesson code practice

Answers

Answer:

loop

Explanation:

Answer:count

Explanation:

girls question
who wants to go out ;p

Answers

MEEEEE PICK ME CHOOSE ME IM LONELY

Answer: I do

Explanation: *P.S.* I'm a Boy

any song recommendations, pls dont say 6ix9ine or lil pump

Answers

I actually do have one tho. Try Megan Tha Stallion.

Answer:

smash mouth "all star" is my fave or Imagine Dragons "Whatever it Takes"

Explanation:

Select the protocol data units.
1. Bit
2. Segment
3. Frame
4. Data
5. Spoof
6. Pin
7. Packet​

Answers

Answer: 4. Data 2. segment  7.packet 3.frame  1.bit

Explanation:

Answer:

segmet bit packet frame data

Explanation:

What are possible challenges of cyberbullying

Answers

Answer:

so,e challenges of cyber bullying is that,it could be a random person bullying u and u won't know who it is,another challenge of cyber bullying is that they can blackmail u or pretend to be u or threaten u

Answer:

Possible challenges of cyberbullying have to do with nonbelievers, or people who do not think cyberbullying is a real problem. Technology makes it hard to stop bullies, and some people do not want to take responsibility.

Match the interface element with the corresponding examples. You will use the elements more than once.

Question 1 options:

List Boxes


Message Boxes


Accordion


Modal Windows


Search Field


Notifications


Buttons


Checkboxes


Tooltips

1.
Input Controls

2.
Navigational Components

3.
Informational Components

4.
Containers

(place each one of them under the 1.2.3.4 categories)

Answers

Answer:I’m nit sure sorry

Explanation:

..

____ a British mathematician devolved the concept of a programmable digital computer and worked with Ada Lovelace to design the first mechanical computer the Analytical Engine

A William Shockley

B Grace Hopper

C Charles Babbage

D Bill Gates

someone pls answer asap ​

Answers

Answer:

C: Charles Babbage

Explanation:

Charles Babbage

Charles Babbage (1791-1871), computer pioneer, designed two classes of engine, Difference Engines, and Analytical Engines.

The analytical engine is a comprehensive robotic computer system that's been fully programmed as well as automatically controlled, and the further discussion can be defined as follows:

The computer pioneer Charles Babbage (1791-1871), designed two engine classes, different engines as well as analytical engines.He was indeed the brain behind ideas and therefore is considered one of the best on two different computers.A British mathematician Charles Babbage has invented the notion of the digital programmable computer and has been working with Ada Lovelace to design an analysis engine's first machine.

Therefore, the final answer is "Option C".

Learn more:

brainly.com/question/23422991

Which search phrase is the most effective to find out about the most popular pizza chains worldwide in 2019?
A.
popular pizza chains in the world
B.
most popular AND pizza chains AND worldwide AND 2019
C.
the most popular pizzas “in the world today” AND 2019 AND chains
D.
2019 worldwide pizza chains “most popular in the world”

Answers

D I believe is correct

Answer:

D

Explanation:

Select the correct answer.
What is a hyperlink?
A.
A bold link that goes back to a newspaper
B.
A link that clicks on itself
C.
A way to cite sources in an online article
D.
A special link on a smartphone

Answers

Answer:

c.

Explanation:

a link from a hypertext file or document to another location or file, typically activated by clicking on a highlighted word or image on the screen.

Answer:

c

Explanation:

came out my study guide and i made a 96 % on my 50 question test

Part B
How would you classify a network formed by connecting two MANs together?
В І у хх Font Sizes А • А

Answers

Computer programming 2254518752669

What action demonstrates unethical behavior?
A.
working overtime
B.
completing your work ahead of time
C.
taking credit for another person’s work
D.
keeping a tab on your organization’s carbon footprint
E.
leaving office on time

Answers

Answer:

taking credit for another person’s work

Any illegal actions, such stealing or physically abusing employees, are unethical at work. Unethical behavior can be observed in a wide range of businesses and environments. Taking credit for another person’s work.

What is Unethical behavior?

When a person, a professional, or an industry acts in a way that is deemed unethical because it goes against social norms, that behavior is referred to as unethical behavior.

Politicians, businesses, professions, and individuals all have the potential to act unethically.

There are other instances of deliberate deception, but they serve as illustrations of how damaging deception can be when it is used to violate someone's rights or security.

Therefore, Any illegal actions, such stealing or physically abusing employees, are unethical at work. Unethical behavior can be observed in a wide range of businesses and environments. Taking credit for another person’s work.

To learn more about Unethical, refer to the link:

https://brainly.com/question/10174825

#SPJ2

how do you give brianliest

Answers

Answer:

When you ask a question in brainly, two helpers will answer it, then on each answerer you'll find "mark as brainliest" button which looks like a crown.

Hope this helps :)

not sure what this means.​

Answers

Answer:

should be text effects............

Text effective it’s not hard it’s easy
Other Questions
A lake in Minnesota was thriving with black bass and bluegill. These particular fish build nests on the sandy bottom of the lake. Now, ecologists are finding that over time a layer of humus has slowly been covering the pond. The ecologists are noting that the populations of black bass and bluegill are declining, and the fish that are able to make nests in humus are rising in numbers. The ecologists can probably conclude that this event is an example of:commensalismparasitismprimary successionsuccession Can someone explain these territorial Acquisitions for me? A ton of points and i will mark as brainliest 3 is multipled by the cube of number. Comment below if you hate police officers and you fell like you can`t trust them anymore SHORT ANSWER Why is this table not a function? Explain your reason. Answer in complete sentences. A rider with a message was sent out of the Alamo while it was under siege. Who was the rider carrying the message?I can't find the answer anywhere... please help methis is Texas History, and I suck at it please help me thanks SUPER EASY, WILL GIVE BRAINLIESTWhats the domain of quadratic functions? A commonly held idea about influenza is that it is a disease that occurs primarily in cold weather. Doctors report incidences of illness, such as influenza, to the Centers for Disease Control (CDC). The graph below shows data for three flu seasons. Note that this graph shows data from October, week 40, of one year to July, week 28, of the following year.Which evidence supports this idea?The graph line for 2008-09 has the highest peaks for flu.All three graph lines show different patterns throughout the year.The graph line for 2008-09 has a peak in week 44.All three graph lines peak over the same few weeks of winter. What is the function and purpose of the proteins embedded in the cell membrane? I'll give BRAINLIEST if you answer this correctly BRAINLIEST!!! Correct and fastest answer! What is the solution to the equation 5(x-3) = 2(x+3)? i need help please i need help How do you say 9.876? answer pls thank you Describe image one. You MUST have at least 3 complete sentences and at least 6 adjectives * What led to the start of the Persian Wars?The Athenians wanted to unify the city-states.The Spartans wanted to expand their territory.Xerxes I hoped to create an alliance with Sparta.Darius I wanted to punish Athens for supporting a revolt. Amy makes $84 for 12 hours of babysitting her first week on the job. The second week she babysits for 14hours and earns $98. The third week she babysits for 20 hours and earns $140. She makes a regularamount of pay per hour. Which equation below could be used to calculate her total earnings each week,E, based on the number of hours she babysits, n? The product of 17 x .67 is ?