Question
In a mission-critical network requiring fault tolerance
and multiple redundant paths, which of the following topologies provides the highest level of redundancy?ÂSolution
The Mesh topology is known for its fault tolerance and redundancy. In a full mesh network, each node is connected to every other node, creating multiple paths for data to travel. This topology provides a high level of redundancy because if one link fails, data can still be routed through alternate paths. Mesh networks are typically used in environments where continuous availability is critical, such as in financial institutions, military communications, or data centers. The resilience of a mesh network makes it the best choice when fault tolerance is a top priority. Why Other Options are Incorrect: A) Bus: The Bus topology has a single point of failure; if the main cable fails, the entire network goes down. B) Ring: Although the Ring topology provides some redundancy, it does not offer the same level of fault tolerance as a Mesh topology. If one node fails, data may not be able to circulate. C) Star: In a Star topology, all nodes are connected to a central hub. If the hub fails, the entire network is affected. E) Hybrid: Hybrid topology combines features of multiple topologies, but its fault tolerance depends on the specific combination. It does not inherently provide the same level of redundancy as a full Mesh topology.
In a 5-stage pipeline (Fetch, Decode, Execute, Memory, Write-back), how many instructions can be in various stages of processing at the same time?
A transformer has a primary coil with 300 turns and a secondary coil with 150 turns. If the primary voltage is 240V, calculate the secondary voltage.
Which of the following is a common problem that synchronization mechanisms address in multi-threaded or multi-process environments?
What happens when a program accesses data that is not currently in physical memory (RAM) due to virtual memory management?
Which of the following is not a valid keyword in C++ language?
XML is designed to ____ and ____ data)
What is the main purpose of a digital signature in public key cryptography?
The best case time complexity of selection sort?
What is the space complexity of an algorithm?
Which functions are declared inside a class have to be defined separately outside the class?