Which of the following network topologies describes a network where packets of data are transmitted from one computer to another in a circular fashion?

a) Ring
b) Mesh
c) Bus
d) Star


Answer: a) Ring

Computer Science & Information Technology

You might also like to view...

The break-up of the bell system was known as

a. equal access b. point-of-presence c. a LATA d. divestiture

Computer Science & Information Technology

Even if you have three instances of styles that control each div tag, the actual div is only added to the page one time.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When a style is previewed in the Styles pane, the document's:

A) character styles are listed first, followed by the paragraph styles. B) paragraph styles are listed first, followed by the character styles. C) character styles are listed first, followed by the bullet styles. D) bullet styles are listed first, followed by the paragraph styles.

Computer Science & Information Technology

What is a valid step that should be taken to make using iSCSI technology on a network more secure?

A. The iSCSI traffic should be encrypted using CHAP. B. The iSCSI traffic should be isolated to a dedicated and separate network. C. The network should make use of hardware based iSCSI instead of software based iSCSI. D. The network switches used for the SAN should be iSCSI aware such that they properly hide iSCSI traffic.

Computer Science & Information Technology