Question

11. Which of the topologies below connects all devices (nodes) to each other for redundancy and fault tolerance. A. Mask topo
0 0
Add a comment Improve this question Transcribed image text
Answer #1

11. Mesh topology

12. Bus topology

13. Bus ring topology

14. Access point

15. Repeaters

Add a comment
Know the answer?
Add Answer to:
11. Which of the topologies below connects all devices (nodes) to each other for redundancy and...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Question 6 After a problem and its symptoms have been identified, a theory regarding a probable...

    Question 6 After a problem and its symptoms have been identified, a theory regarding a probable cause should be established. True False 1.25 points Question 7 An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? a. fail-tolerant b. fail-close c. fail-open d. fail-dynamic 1.25 points Question 8 At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? a. Application b. Session c. Transport...

  • 1. Which of the following protocols is used by a client to send an email message?...

    1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...

  • Q.1 Choose the correct answer 1. Performance is evaluated by two networking metrics: throughput 6 Marks...

    Q.1 Choose the correct answer 1. Performance is evaluated by two networking metrics: throughput 6 Marks and delay. We often need I2 Marks ) a. less throughput and less delay b. more throughput and less delay c. less throughput and more delay d more throughput and more delay 1 1 1 1 1 1 1 1000000000011000010101010101101010101011 is._L 2 Marks ] a. Unicast b. Broadcast c. Multicast d. None of the above 2 Marks) 3. The maximum data length for 10...

  • Homework. Answered Which is not true of the Transmission Control Protocol (TCP)? Multiple answers: You can...

    Homework. Answered Which is not true of the Transmission Control Protocol (TCP)? Multiple answers: You can select more than one option O A it supports full duplex communication o B it has graceful connection shutdown O с its connections are logical D it uses the message paradigm E it is an end-to-end protocol O F None of the above Answered Change your responses to resubmit Match the NIST Framework Category with the Task Premise Response Drag and drop to match...

  • 1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24...

    1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24 none of the above Question 2 On which of the following devices does the transport layer NOT run? laptop router cellphone A, B and C none of the above Question 3 What is the source address contained in the discover message sent by a host that is wanting to obtain an IP address? 255.255.255.255 0.0.0.0 the IP address of the server the last IP...

  • pls answer all questions 1) A step-by-step solution to a problem is called a. hardware b....

    pls answer all questions 1) A step-by-step solution to a problem is called a. hardware b. an operating system c. a computer language d. an algorithm 2) separated the programming task from the computer operation tasks. a. Algorithms b. Data processors c. High-level programming languages d. Operating systems 3) is a 16-bit code that can represent symbols in languages other than English. a. ASCII b. Extended ASCII c. EBCDIC d. Unicode 4) When you want to download music to a...

  • Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic...

    Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT