This topic contains a solution. Click here to go to the answer

Author Question: A ________ key is a unique identifier that should be created and used when designing a database for ... (Read 99 times)

V@ndy87

  • Hero Member
  • *****
  • Posts: 571
A ________ key is a unique identifier that should be created and used when designing a database for each type of entity, in order to store and retrieve data accurately.
 
  A) foreign
  B) surrogate
  C) primary
  D) super
  E) candidate

Question 2

Compare and contrast star network, ring network, bus network, and mesh network topologies.
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

kaillie

  • Sr. Member
  • ****
  • Posts: 326
Answer to Question 1

C

Answer to Question 2

Network topology refers to the shape of a network. The four common network topologies are star, ring, bus, and mesh.

A star network is configured in the shape of a star. That is, all nodes or workstations are connected to a central hub, or concentrator, through which all messages pass. The workstations represent the points of the star. Star topologies are easy to lay out and modify. However, they are also the most costly because they require the largest amount of cabling. Although it is easy to diagnose problems at individual workstations, star networks are susceptible to a single point of failure at the hub that would result in all workstations losing network access.

A ring network is configured in the shape of a closed loop or circle with each node connecting to the next node. In ring networks, messages move in one direction around the circle. As a message moves around the circle, each workstation examines it to see whether the message is for that workstation. If not, the message is regenerated and passed on to the next node. This regeneration process enables ring networks to cover much larger distances than star or bus networks can. Relatively little cabling is required, but a failure of any node on the ring network can cause complete network failure. Self-healing ring networks avoid this by having two rings with data flowing in different directions; thus, the failure of a single node does not cause the network to fail. In either case, it is difficult to modify and reconfigure a ring network. Ring networks normally use some form of token-passing media access control method to regulate network traffic.

A bus network is in the shape of an open-ended line; as a result, it is the easiest network to extend and has the simplest wiring layout. This topology enables all network nodes to receive the same message through the network cable at the same time. However, it is difficult to diagnose and isolate network faults. Bus networks use variants of CSMA for media access control.

A mesh network consists of computers and other devices that are either fully or partially connected to each other. In a full mesh design, every computer and device is connected to every other computer and device. In a partial mesh design, many but not all computers and devices are connected. Like a ring network, mesh networks provide relatively short routes from one node to another. Mesh networks also provide many possible routes through the network-a design that prevents one circuit or computer from becoming overloaded when traffic is heavy. Given these benefits, most WANs, including the Internet, use a partial mesh design.




V@ndy87

  • Member
  • Posts: 571
Reply 2 on: Jul 7, 2018
:D TYSM


carojassy25

  • Member
  • Posts: 299
Reply 3 on: Yesterday
Gracias!

 

Did you know?

The average adult has about 21 square feet of skin.

Did you know?

Many of the drugs used by neuroscientists are derived from toxic plants and venomous animals (such as snakes, spiders, snails, and puffer fish).

Did you know?

Automated pill dispensing systems have alarms to alert patients when the correct dosing time has arrived. Most systems work with many varieties of medications, so patients who are taking a variety of drugs can still be in control of their dose regimen.

Did you know?

The human body's pharmacokinetics are quite varied. Our hair holds onto drugs longer than our urine, blood, or saliva. For example, alcohol can be detected in the hair for up to 90 days after it was consumed. The same is true for marijuana, cocaine, ecstasy, heroin, methamphetamine, and nicotine.

Did you know?

Calcitonin is a naturally occurring hormone. In women who are at least 5 years beyond menopause, it slows bone loss and increases spinal bone density.

For a complete list of videos, visit our video library