This is an image of the ...........................Topology.

if answer Correct i will mark the first person brainly.​

This Is An Image Of The ...........................Topology.if Answer Correct I Will Mark The First Person

Answers

Answer 1

Answer:

Mesh

Explanation:


Related Questions

can’t be opened because apple cannot check it for malicious software.

Answers

Answer:

try to reset  your computer.

Explanation:

Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after tax and tip, for a passed in price, assuming tip is always 15% and tax is always 8%?

a. public double getFinalPricel double tips, double tax).
b. public double getFinal Price double tax)
c. public double getFinalPrice/double basePrice, double tips)
d. public double getFinalPrice double basePrice, double tips, double tax)

Answers


D. I hope it helped

Lucy is in charge of creating a user interface for a new app. During what phase of the project should she expect to complete her work?

A.
alongside the development of the app

B.
after the app has been developed

C.
during the testing phase

D.
during the design phase

Answers

Answer:

C option

Explanation:

Because in testing phase the game has been developed and test for errors in game.

¿Qué juegos pueden jugarse en un Raspberry 4 B con 2 GB de RAM?

Answers

Answer:

flow chart of sales amount and commission %of sales

This computer is used by touching your finger.
A Desktop
C. Mainframe
B. Laptop
D. Tablet​

Answers

Answer:

a tablet because it's controlled by the touch of a finger.

how does digital and hybrid computers differ in portability​

Answers

Answer:

Digital computers perform functions like mathimatical,compex calculations. while hybrid computers work with the duo combinations like analog and tempature.

Explanation:

I passed the class A+

yourwelcome :)

thank me if it was correct for you too.

____________________ are protocols used by routers to make path determination choices and to share those choices with other routers.

Answers

Answer: Routing protocols

Explanation:

Find the error in the following code fragment. int a: System.out.print(a):​

Answers

Answer:

If your using java, then its supposed to be "System.out.print("a")"    

Explanation:

its supposed to have quotations

what is the term for delivering an application over the internet called?

Answers

Answer:

Cloud computing

Explanation:

The termnology which is used to describe the delivering of an application over the internet is called SaaS.

What is SaaS?

SaaS is an acronym for Software as a Service and it can be defined as a type of cloud computing delivery model that typicaly involves developing and making licensed software applications available to end users on a subscription basis and over the Internet, especially by centrally hosting these software applications within the cloud or through a third-party (vendor).

This ultimately implies that, Software as a Service (SaaS) is a termnology which is used to describe the delivering of an application over the internet.

Read more on SaaS here: https://brainly.com/question/24852211

Pls help me pls I’m struggling

Answers

Answer:

Forward(30)

Explanation:

To turn right you have to say right(Angle) and then forward(steps) to go that many steps in that direction

difference between boot disk and booting in 5 points​

Answers

[tex]Answer \: -[/tex]

In computing, booting is the process of starting a computer. It can be initiated by hardware such as a button press, or by a software command. After it is switched on, a computer's central processing unit (CPU) has no software in its main memory, so some process must load software into memory before it can be executed. This may be done by hardware or firmware in the CPU, or by a separate processor in the computer system.

A boot disk is a removable digital data storage medium from which a computer can load and run an operating system or utility program. The computer must have a built-in program which will load and execute a program from a boot disk meeting certain standards.

Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authentication.

Answers

Answer:

is a security that needs two types of identification to access what your trying to enter.

Explanation:

Ex= to enter email, you first need to put in password, then verify by phone call that u need to enter.

A ____ is a rectangular object you can click; when you do, its appearance usually changes to look pressed.

Answers

Answer:

button

Explanation:

Katie is writing a print statement but nothing is printing. Which of the following should she check for?

A.
Make sure the print statement is surrounded by parentheses.

B.
Make sure the word print is in all capital letters.

C.
Make sure there is a colon after the print statement.

D.
Make sure the next line after the print statement is indented.

Answers

Answer:

A.

Explanation:

Parenthesis are required to be around the data in a print function. All the letters in a  print statement should be lowercase. A colon isn't required after a print statement. Indentation is not needed for a print statement because there are no colons after the statement instead. Here's an example where you would need to indent the line:

def randNum( x, y ):

    x = input("Enter number: ")

    y = input("Enter number: ")

    return x * y

Here's an example of a print statement:

print("My name is Sullen.")

codes 7.2.8: Listed Greeting python
pls help i have no idea on how to fix this

Answers

The listed greetings program is an illustration of Python functions.

The error in the program is that the program is not properly indented.

Python program uses indents to identify blocks of code.

So, the fix to the program is to properly indent the code, and the fix (without the comments) is as follows:

def greetings(s):

   x = s.split()

   print("Hello, "+x[0]+"! I also enjoy "+x[1]+"!")

Read more about Python programs at:

https://brainly.com/question/16240699

Brianna is taking a backpacking trip in the wilderness and wants to back up the photos from her camera. Which type of storage device would be best for this purpose?
A. Optical disc
B. Cell phone
C. Flash drive
D. HDD

Answers

Answer:

C

Explanation:

Flash drives usually have an input (E.G. one of those android charger connectors), so just plug that into your camera, and load the flash drive with the photos. Then go home and plug the USB on the flash drive into your PC. If there isn't already, a folder will be made in your "Pictures" folder on your PC, to which you can open the folder, and then your photos should be there. From there you can open them, print them, etc.

Hope this helped, and sorry if I didn't answer in time.

What software type is software that is distributed free of charge, but the source code is not available

Answers

Answer:

Closed Source software programs

Pls help me pls I’m struggling

Answers

Answer:Turn Right () Degrees (block)

The turn right () degrees block is a Motion block and a stack block. The block turns its sprite's direction the specified amount of degrees clockwise.

The ____ layer in the TCP/IP model is a direct equivalent to the Network layer in the OSI reference model.

Answers

Answer: Application

Explanation:

List three (3) features of first generation computer

Answers

Answer:

features are

the first generation computer were based on vacuum tube technology

they were very large in size,very slow in speed and very low in capacity

they used to get heat very soon

Main electronic component – vacuum tube.

Main memory – magnetic drums and magnetic tapes.

Programming language – machine language.

Power – consume a lot of electricity and generate a lot of heat.

_____ is the dynamic storage allocation algorithm that results in the largest leftover hole in memory.

Answers

Answer: Worst fit

Explanation:

Why is experience in their own factory setting
crucial for a manager in the manufacturing
business?

Answers

Answer:

How to Manage Manufacturing Operations Effectively

Ensure High-Quality Products. ...

Ensure High-Quality Equipment. ...

Know How To Maximize Resources. ...

Look Into Technological Advancements. ...

Check Your Customer Service. ...

Consider Reducing Waste. ...

Conclusion.

Explanation:

What is the interface of an app?
a storyboard software
the part the user sees
a sketch of your idea
a testing environment

Answers

Explanation:

An application interface or user interface ,is the set of features an application provides so that user may supply input to and recieve output from,the program.


Pls help me pls I’m struggling

Answers

you have it correct

Which of these problems is correct if the numbers are binary numbers?
Group of answer choices

1 + 1 = 2

1 + 1 = 10

0 + 0 = 1

1 + 0 = 10

Answers

Answer:

1 + 1 = 10

Explanation:

2 does not occur in the binary "alphabet"

0 + 0 = 0 in any base, so also in binary

1 + 0 = 1 in any base, so also in binary

The answer is 1 + 1 = 10
1 = 1 in binary numbers, so 1 + 1 = 2 but 2 in binary numbers is 10, 2 doesn’t exist in binary numbers, it is only 1s and 0s so therefore it would be 10.

which computer belongs to the first generation?​

Answers

ENIAC (Electronic Numerical Integrator and Calculator .)

Which of the following is true regarding computer science careers?
A. There are a limited number of jobs in this field.
B. There are not different job types in this field.
C. The number will increase over the next several years.
D. You must be a programmer to work in this field.
(WILL MARK BRANLIEST IF CORRECT)

Answers

Answer: There are several different job types in this field.

Explanation: did the test and got it right

Answer:

A or C!

Explanation:

Im pretty sure its one of those answers. I think its C though! If I'm wrong, please tell me! I just did the test and I forgot if I got it right or not. It wont let me go back in-

- A FLVS student with a 99.91 percent in computer science (Totally not bragging!)

Please define processor​

Answers

Processor means to break down something.

1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m)
= Y
2. Decrypt this cipher text into a binary string: 106

I am very stuck and still don’t know how these work.

Answers

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

Write a function float Average(int, int) that finds the mean, and then write a main program that inputs two numbers from the user repeatedly until the user enter “0”. You need to call the function and display the mean of two numbers in the main. C++ language only.

Answers

The program illustrates the use of functions.

Functions are used to group related code segments that act as one, when called.

The program in C++ where comments are used to explain each line is as follows:

#include <iostream>

using namespace std;

//This defines the Average function

float Average(int num1, int num2){

   //This returns the average of the numbers

   return (num1+num2)/2.0;

}

//The main method begins here

int main(){

   //This declares the numbers as integer

   int num1, num2;

   //This gets input for both numbers

   cin>>num1; cin>>num2;

   //This is repeated until the user enters 0

   while(num1!=0 || num2 !=0){

       //This calls the average function, and prints the average

       cout<<Average(num1,num2)<<'\n';

       //This gets input for both numbers, again

       cin>>num1; cin>>num2;

   }

   return 0;

}

Read more about similar programs at:

https://brainly.com/question/17378192

Other Questions
Lily is planning to sell her home, which she bought seven years ago for a total of $168,000. The property value has increased by 2. 5% each year for the past seven years. In the meantime, Lily has made improvements and renovations to the home which increase its sale value by $52,000. How much will Lily sell the home for, to the nearest hundred dollars? a. $261,500 b. $249,400 c. $267,000 d. $251,700. You have been asked to write an argumentative essay about Dylans receipt of the Nobel Prize in Literature. Your essay will be read by high school students. Considering the audience, what information would be best to include in the introductory paragraph? how much heat is released when 32g of water cools from 46C and freezes What is the sum of 4(0.5) "1?n=1O S=1.5OS = 2O S = 4.5O S= 8 WHAT IS 10x+55 = 100 Why did many Americans seek a change in the election of 1980?Why did many Americans seek a change in the election of 1980? In 1860, a scientist named Gregor Mendel used pea plants to determine the dominance of certain traits. In one of his experiments, he looked at the inheritance of pod color. Construct a Punnett square for a pea plant with YY phenotype for a yellow pod cross-pollinated with a pea plant with yy phenotype for a green pod. How many gallons of gas canyou afford with $34.83 if a gallon of gas is $3.87 a gallon? Discuss the reasons why natives opposed the US Government Can somebody help me as soon as possible Ill give brainliest Kianna lives in a town where the streets are laid out in a grid. She uses a coordinate plane to draw a map of the town, with her school at the origin. Kianna plots points for the locations of her house and her best friend Jo's house on the grid.Kianna's house is at the point (4, 2).Kianna's and Jo's houses are reflections of each other across both axes.1. What are the coordinates of Jo's house? Explain how you know in the space below.2. Kianna walks from her house to Jo's house. She first walks west and then walks south. How many blocks west does Kianna walk? How many blocks south?Write your answer in the space below.3. Elena's house is a reflection of Jo's house across the x-axis.What are the coordinates of Elena's house? Explain in the space below.4. Kianna says that Elena's house is actually a reflection of her house across the y-axis.Is Kianna right? Explain The nurse is assessing a patient who has experienced a recent cerebral vascular accident (CVA). The components of the neurological exam include: (select all that apply) 100 Point question answered ASAP for brainliest! Kelly bought cups for home. Each cup cost $3. He gave$40 to the cashier and got $13 back in change. How manycups did she buy? Why was life in ghettos difficult for the Jews?A. Jews were not permitted to bond with each other.B. The Jews did not get adequate food.C. The Jews had to undertake hard labor.D. The Jews were separated from their families. 1. Kim's age is three times that of her sister. When you add Kim's age to her sister's age, you get 48. How old is each sister? (a) Write an equation that represents the situation. Explain any variable used. (1 point) (b) Solve the equation from Part (a). Show your work. (4 points) HELPP! PICTURE ATTACHED find f(2) Five pipes can fill a tank in 80 minutes. At the same rate, how long will it take 8 pipes to fill the same tank? Determine the percent composition of chromium (III) flouride CrF3(Show your solution) A furniture store donated a percentage of every sale to hospitals. The total sales were $7,125 so the store donated $570. What percent of 7,125 was donated to hospitals