Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, according to their circumstances. ​Neil's client wants to follow the current trends with everyone else in terms of speed and versatility. He is risk-averse and wants to leverage the most popular local area network (LAN) topology. Which of the following will Neil recommend to this client?​
A. ​A bus network
B. ​A ring network
C. ​A hub network
D. ​A star network

Answers

Answer 1
Answer:

Answer:

Neil should recommend to this client a star network.

Explanation:

A star network is a computer network where every host is connected to a central hub, switch, or computer.

Main advantage of a star network is that one corruption (unless it is central hub) doesn't affect the rest of the network, and it's easy to modify.

The star network is one of the most common computer network setups


Related Questions

In vehicles equipped with ABS, the driver's foot must remain firmly on the _________ to activate the ABS.
The ___ database option facilities you to create Database from scratch ​
Noodletools is one of the Online databases available at the BLA librarywebsite. I can print a copy and/or export a copy of my citations fromNoodletools.TrueFalse
Renting provides ____ flexibility but can lead to __ costs in the long term
Imagine you just bought a cable installation company that routinely treats its residential customers poorly. You want your company to satisfy customers but it promises a certain connectivity speed that isn't realistic in most homes. It says it will send repair people within a certain time window, but when they get tied up and are running late, no one calls the customers. You hear complaints every time you answer the phone. What approach would be most likely to resolve your cognitive dissonance? a. You can purchase and start to use new software for scheduling repairs and calls. b. You can stop answering the phone. c. You can quit this job and go to work in another industry altogether. d. You can continue to believe in customer service but not make changes.

What is a computer ? what are the uses of computer​

Answers

A computer can be defined as an electronic device which accepts data, processes data and brings out information known as results.

The uses of a computer system

  • Business: A computer can be used to perform business transactions online. It is used by both sellers and buyers to market and purchase product respectively.

  • Entertainment: A computer can be used to play music, watch movies and play games.

  • Prepare documents: The computer is used to type and edit different forms of documents like word, PDF and Excel.

  • Save information: A computer is used to save information for future use and reference.

Therefore, a computer has the ability to store, retrieve and process information.

Learn more about computer:

brainly.com/question/474553

#SPJ5

Answer:

computer is an electronic device for storing and processing data, typically in binary form, according to instructions given to it in variable programs.

the uses of Computer is alot

from entertainment to work station

to programmers to make a program

it all depends on how we want to use it

some might use it as both entertainment and workstation too. and the fact that computers can stores and sorted many different files for example writing a 1000 page book can be a hard time to save the space in the physical world but much easier on the digital world(inside the computer)

If the driven shaft and the drive are at the same angle but turn in opposite directions, the gearing system is called a A. worm drive. B. chain drive. C. gear and pinion drive. D. belt drive.

Answers

It's a gear and pinion drive.

This is a broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions.a. best practice
b. data mart
c. business information warehouse
d. business intelligence
e. business warehouse

Answers

Answer:

Business intelligence.

Explanation:

That concept that applies to that of the selection, incorporation, evaluation, and analysis of companies or business information systems, software, and behaviors. It is direct at promoting good business decision-making.

This is a wide concept of software and technology to capture, store, analyze, and to provide information access to support users make far better strategic decisions.

. Why does the Moon have a greater effect on the tides compared to the Sun? (Select WILL GIVE BRANLEST PLS ASAP

two.)
The Moon is smaller than the Sun.
The Sun is closer to the Earth.
The Moon’s gravitational pull on the Earth’s oceans is stronger.
The Moon is closer to the Earth.
The Sun’s gravitational pull on the Earth’s oceans is stronger.

Answers

The correct option that explains the reason why the moon will have greater effect on the tides compared to the sun is;

Option D; The moon is closer to the Earth

  • Generally speaking, ocean tides on the earth are caused by both the gravity of the moon and the gravity of the sun.

Now, the mode of generation of ocean tides is not really by the total strength of gravity, but rather by the gravitational gradient.

Gravitational gradient is simply defined as the gravity differences from one spot to the other.

  • Now, from research, we know that the sun is far larger than the moon and this means in consequence it will have a far stronger total gravity than that of the moon. However, due to the fact that the moon is closer to the earth than the sun, it means the moon would possess a stronger gravitational gradient than which the sun possesses.

  • Now, let's get to ocean tides; The ocean tides arise as a result of the response of ocean water to a gravitational gradient and as a result, the moon will have a greater role in creating tides than that which the sun does.  

Read more at; brainly.com/question/24996618

When possible, you should avoid using _________ variables in a program?

Answers

Answer:

Global variable

Explanation:

You should avoid using global variables in a program because global variables can be accessed by any part of the code  and every function or any part of the code has the tendency to alter or modify its value. One can't limit the scope or in other words one cant simply force any part of the program not to use them or  modify it's values. Testing of large programs also becomes difficult as it is hard to keep track of the functions reading and modifying the values of global variables

Which are *four* best practices used in the access layer? a. Disable trunking in host ports. b. Limit VLANS to one closet. c. Use PVST+ as the STP with multilayer switches. d. Enable trunking on host ports. e. Use VLAN spanning to speed convergence of STP. f. Use VTP Server mode in hierarchical networks. g. Use VTP Transparent mode in hierarchical networks. h. Use RPVST+ as the STP with multilayer switches.

Answers

Answer:

According to the web search results, some of the best practices used in the access layer are:

Disable trunking in host ports12. This prevents unauthorized users from accessing other VLANs by configuring their NIC to use a different VLAN ID.

Use VTP Transparent mode in hierarchical networks2. This allows the access layer switches to pass VTP messages without modifying them, and avoids the risk of VTP configuration errors that could affect the entire network.

Use RPVST+ as the STP with multilayer switches2. This provides faster convergence and load balancing for VLANs, as each VLAN can have a different root bridge and spanning tree topology.

Use VLAN spanning to speed convergence of STP2. This allows multiple access layer switches to share a common bridge ID and port priority, and reduces the number of STP instances that need to be calculated.

These are some of the possible answers, but there may be other valid ones depending on the network design and requirements.

Explanation:

Final answer:

The four best practices for access layer include disabling trunking in host ports, limiting VLANs to one closet, using VTP Server mode and VTP Transparent mode in hierarchical networks. They help in improving network security, efficiency, and management.

Explanation:

The four best practices in the access layer according to the options given are as follows: 'Disable trunking in host ports', 'Limit VLANS to one closet', 'Use VTP Server mode in hierarchical networks', and 'Use VTP Transparent mode in hierarchical networks'.

Disabling trunking in host ports is a security measure that restricts the switching of traffic between VLANs. Limiting VLANs to one closet ensures consistency of connectivity and enhances network performance. VTP Server mode is used to propagate VLAN information in a hierarchical network, improving management efficiency. Finally, VTP Transparent mode is used in hierarchical networks for devices that do not participate in VTP but still forwards VTP advertisements. They form part of the best practices for access layer design and help in achieving network stability, efficiency and security.

Learn more about Access Layer Best Practices here:

brainly.com/question/35910029

#SPJ11