What are the various topologies? Which one is the most secure?
Answers were Sorted based on User's Feedback
Answer / ananth kumar
There are 5 topologies.They are:
1.star topology,
2.bus topology,
3.ring topology,
4.mesh topology,
5.tree topology.
The most secured topology is mesh topology b'cos each and
every system has its interconnection hence it is cost
effective it is not implemented mostly.
Is This Answer Correct ? | 7 Yes | 1 No |
Answer / xxxx
totally 5 topologies: star topology, bus topology,ring
topology,mesh topology,tree topology
Is This Answer Correct ? | 1 Yes | 2 No |
what is the different bitween abap and abap-hr?
What are the loops in c?
a direct address that identifies a location by means of its displacement from a base address or segment a) absolute address b) relative address c) relative mode d) absolute mode
How to run c Program without using IDE of c. means if program made in notepad.then how to compile by command prompt.
a simple c program using 'for' loop to display the output 5 4 3 2 1
WHAT IS LOW LEVEL LANGUAGE?
Give a one-line C expression to test whether a number is a power of 2. [No loops allowed - it's a simple test.]
How can you allocate arrays or structures bigger than 64K?
character array A[12] can hold
write a C program:There is a mobile keypad with numbers 0-9 and alphabets on it. Take input 0f 7 keys and then form a word from the alphabets present on the keys.
1 Answers 91mobiles, Amazon, App Guruz, College School Exams Tests, Folio3, Infosys, Omega, Planin, Riphah International University, Subex,
How to write a program for swapping two strings without using 3rd variable and without using string functions.
what is the stackpointer