COGNITIVE ASSESSMENT
You run a large network in which it is important to keep a duplicate of the central devices in case the primary one fails. What category of network topology does this network use?
A. bus network
B. ring network
C. star network
D. core network
Answer: C
You might also like to view...
The __________ attack is where the attacker chooses a list of messages before attempting to break the user's signature scheme, independent of the user's public key. The attacker then obtains from the user valid signatures for the chosen messages.
Fill in the blank(s) with the appropriate word(s).
How many elements does t have?
Consider a two-by-three integer array t.
A tabbed list can be converted to a Table by using the ________ button
A) Table B) Format C) List D) Edit
Which of the following best describes hyperlinks?
A) Text or other objects that display a document, location, or windows when clicked. B) Any object on a form or report. C) Fields whose values are retrieved from another table. D) Controls that perform an action or sequence of actions when clicked.