Home
Q&A
Education
Technology
Credit
General
Health
Insurance
Questions
Ask a Question
Security and privacy are less in a ……………… topology.A) MeshB) BusC) Star
Home
Education
Security and privacy are less in a...
asked
Dec 24, 2021
in
Education
by
JackTerrance
Security and privacy are less in a ……………… topology. A) Mesh B) Bus C) Star D) Tree Select the correct answer from above options
computer-science-interview-questions
computer-science-questions
1
Answer
0
votes
answered
Dec 24, 2021
by
JackTerrance
Best answer
Answer: Bus Explanation: Thanks……………
Related questions
0
votes
Q: Security and privacy are less in a ……………… topologyA) MeshB) BusC) Star
Security and privacy are less in a ……………… topology A) Mesh B) Bus C) Star D) Tree Select the correct answer from above options...
asked
Dec 24, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: Tree topology is a combination of ring and star networks______
Tree topology is a combination of ring and star networks______ true or false Select the correct answer from above options...
asked
Nov 29, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: network that contains multiple hubs is most likely configured in a …………… topology.A) BusB) MeshC) Star
network that contains multiple hubs is most likely configured in a …………… topology. A) Bus B) Mesh C) Star D) Tree Select the correct answer from above options...
asked
Dec 25, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: what is network topology?and,
what is network topology? and, what are the uses of ISP? Select the correct answer from above options...
asked
Nov 29, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: In bus topology, the device linking all the nodes in a network isA) RouterB) DropLineC) Backbone
In bus topology, the device linking all the nodes in a network is A) Router B) DropLine C) Backbone D) Hub Select the correct answer from above options...
asked
Dec 25, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: which topology that defines the way how information flows between different parts of computer
which topology that defines the way how information flows between different parts of computer Select the correct answer from above options...
asked
Dec 19, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: .Mesh topology requires long lengths of cabling ________ true or false
.Mesh topology requires long lengths of cabling ________ true or false Select the correct answer from above options...
asked
Nov 30, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: Star Ltd has received application for 48 crore (issue size was50crore ) discuss the document filled with a register of companies
Star Ltd has received application for 48 crore (issue size was50crore ) discuss the document filled with a register of companies Select the correct answer from above options...
asked
Dec 24, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: 3- To specify the start value of the first item from which an ordered list should star,the
3- To specify the start value of the first item from which an ordered list should star, the attributes used. Select the correct answer from above options...
asked
Dec 14, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: Which of the following feature of endpoint security solutions involves real time monitoring of network topology, connections, and traffic flow?
Which of the following feature of endpoint security solutions involves real time monitoring of network topology ... Centralized Security Management All of these Continous Detection...
asked
Oct 25, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Which of the following is an intensive review performed to confirm compliance with the customer’s security, privacy, and reliability requirements?
Which of the following is an intensive review performed to confirm compliance with the customer’s security, privacy ... Maturity Review B. Process Audits C. Technical Review...
asked
Feb 25, 2023
in
Technology
by
JackTerrance
ssa-interview-questions-answers
0
votes
Q: The Corda vision is a _______ in which all economic factors can transact with full privacy, autonomy, and security, and in an auditable manner.
The Corda vision is a _______ in which all economic factors can transact with full privacy, autonomy, and security, ... logical ledger B. Platform C. Central database D. Network...
asked
Feb 23, 2023
in
Education
by
JackTerrance
r3-corda-interview-questions-answers
0
votes
Q: VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.
VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network. (a) True ... and answers pdf, mcq on Cyber Security pdf,...
asked
Nov 4, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
0
votes
Q: < = is a less than or equal to operator. is it true or false
< = is a less than or equal to operator. is it true or false Select the correct answer from above options...
asked
Dec 24, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: there is less data redundancy in MS accessTrue
there is less data redundancy in MS access True False Select the correct answer from above options...
asked
Dec 21, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
...