in Education by
Security and privacy are less in a ……………… topology. A) Mesh B) Bus C) Star D) Tree Select the correct answer from above options

1 Answer

0 votes
by
 
Best answer
Answer: Bus Explanation: Thanks……………

Related questions

0 votes
    Security and privacy are less in a ……………… topology A) Mesh B) Bus C) Star D) Tree Select the correct answer from above options...
asked Dec 24, 2021 in Education by JackTerrance
0 votes
    Tree topology is a combination of ring and star networks______ true or false Select the correct answer from above options...
asked Nov 29, 2021 in Education by JackTerrance
0 votes
    network that contains multiple hubs is most likely configured in a …………… topology. A) Bus B) Mesh C) Star D) Tree Select the correct answer from above options...
asked Dec 25, 2021 in Education by JackTerrance
0 votes
    what is network topology? and, what are the uses of ISP? Select the correct answer from above options...
asked Nov 29, 2021 in Education by JackTerrance
0 votes
    In bus topology, the device linking all the nodes in a network is A) Router B) DropLine C) Backbone D) Hub Select the correct answer from above options...
asked Dec 25, 2021 in Education by JackTerrance
0 votes
    which topology that defines the way how information flows between different parts of computer Select the correct answer from above options...
asked Dec 19, 2021 in Education by JackTerrance
0 votes
    .Mesh topology requires long lengths of cabling ________ true or false Select the correct answer from above options...
asked Nov 30, 2021 in Education by JackTerrance
0 votes
    Star Ltd has received application for 48 crore (issue size was50crore ) discuss the document filled with a register of companies Select the correct answer from above options...
asked Dec 24, 2021 in Education by JackTerrance
0 votes
    3- To specify the start value of the first item from which an ordered list should star, the attributes used. Select the correct answer from above options...
asked Dec 14, 2021 in Education by JackTerrance
0 votes
    Which of the following feature of endpoint security solutions involves real time monitoring of network topology ... Centralized Security Management All of these Continous Detection...
asked Oct 25, 2020 in Technology by JackTerrance
0 votes
    Which of the following is an intensive review performed to confirm compliance with the customer’s security, privacy ... Maturity Review B. Process Audits C. Technical Review...
asked Feb 25, 2023 in Technology by JackTerrance
0 votes
    The Corda vision is a _______ in which all economic factors can transact with full privacy, autonomy, and security, ... logical ledger B. Platform C. Central database D. Network...
asked Feb 23, 2023 in Education by JackTerrance
0 votes
    < = is a less than or equal to operator. is it true or false Select the correct answer from above options...
asked Dec 24, 2021 in Education by JackTerrance
0 votes
    there is less data redundancy in MS access True False Select the correct answer from above options...
asked Dec 21, 2021 in Education by JackTerrance
...