answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harina [27]
2 years ago
9

Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is bein

g used?
Computers and Technology
1 answer:
m_a_m_a [10]2 years ago
5 0

Answer:

Star Topology

Explanation:

Star network topologies are common in home networks, where the central connection point may be a router, switch, or network hub. Unshielded Twisted Pair (UTP) Ethernet cabling is typically used to connect devices to the hub, though coaxial cable or optical fiber may also be employed.

You might be interested in
Henry is creating a firewall rule that will allow inbound mail to the organization. what tcp port must he allow through the fire
charle [14.2K]
He needs to use a password from henry to get pass the firewall
3 0
2 years ago
Read 2 more answers
Plz help code practice for python
laila [671]

Answer:umm

Explanation:

6 0
2 years ago
Read 2 more answers
A user requests an unencrypted webpage from a web server running on a computer, listening on the Internet Protocol address 10.1.
Minchanka [31]

Answer:

10.1.1.150:80

Explanation:

Socket address is the combination of an IP address and port number.

HTTP is what most unencrypted webpage use, instead of HTTPS which is the encrypted version of HTTP.

By default, webserver using Hypertext Transfer Protocol (HTTP) uses a standard port known as port 80.

The Socket address which is the combination of the IP address and standard port number will be something like this:

10.1.1.150:80

3 0
2 years ago
A new company starts up but does not have a lot of revenue for the first year. Installing anti-virus software for all the compan
Feliz [49]

WAN domain which stands for Wide Area Network and consists of the Internet and semi-private lines. The <span>RISKS are: Service provider can have a major network outage, Server can receive a DOS or DDOS attack</span> and A FTP server can allow anonymously uploaded illegal software.





7 0
2 years ago
What is ODBC? How is it related to SQL/CLI? 10.2. What is JDBC? Is it an example of embedded SQL or of using function calls? 10.
tamaranim1 [39]

Answer:hhhhhhhhh

Explanation:

5 0
2 years ago
Other questions:
  • Mary is writing an article about the animal kingdom. She wants to place image below the text. Which menu should Mary choose for
    15·2 answers
  • What are the two most important network-layer functions in a datagram network? what are the three most important network-layer f
    7·1 answer
  • An mp3 takes up about 16 kilobytes of memory per second of music. if you owned a one terabyte hard drive and filled it with only
    15·1 answer
  • A mistake programmers often make with loops is that they ____.
    15·1 answer
  • Broker Ray is closely acquainted with the Subdivision Heights neighborhood of his town. Over the year, Ray has made it a practic
    7·1 answer
  • Write the definition of a function printLarger, which has two int parameters and returns nothing. The function prints the larger
    15·1 answer
  • What is printed by the following program provided all necessary standard header files are included? Explain each line of the out
    10·1 answer
  • Suppose a computer using direct mapped cache has 220 bytes of byte-addressable main memory, and a cache of 32 blocks, where each
    5·1 answer
  • What are some reasons DNS is necessary? Check all that apply. A. It maps local addresses to simple names without editing hosts f
    7·1 answer
  • Which option in the Caption dialog box configures whether the caption appears above or below the image
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!