COGNITIVE ASSESSMENT
You run a large network in which it is important to keep a duplicate of the central devices in case the primary one fails. What category of network topology does this network use?

A. bus network
B. ring network
C. star network
D. core network


Answer: C

Computer Science & Information Technology

You might also like to view...

The __________ attack is where the attacker chooses a list of messages before attempting to break the user's signature scheme, independent of the user's public key. The attacker then obtains from the user valid signatures for the chosen messages.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

How many elements does t have?

Consider a two-by-three integer array t.

Computer Science & Information Technology

A tabbed list can be converted to a Table by using the ________ button

A) Table B) Format C) List D) Edit

Computer Science & Information Technology

Which of the following best describes hyperlinks?

A) Text or other objects that display a document, location, or windows when clicked. B) Any object on a form or report. C) Fields whose values are retrieved from another table. D) Controls that perform an action or sequence of actions when clicked.

Computer Science & Information Technology