1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina CMI [18]
3 years ago
11

What are the benefits of building redundancy into a network? What are the potential issues with building redundancy?

Computers and Technology
1 answer:
dusya [7]3 years ago
8 0

Answer: Network redundancy can be defined as the process of adding the network device, along with a line of communication to provide network availability.

Explanation:

Benefits of building redundancy into a network: It decreases the risk of network failure.

If one server fails to transfer the information, then the backup server will take the charge to help in continuing the communication.

Potential issues with building redundancy: Denial of service and cyber attacks are the threats to network.

Without the use of backup system the one point failure can disrupt the entire system.

You might be interested in
Write five importanceof saving a file.​
olga nikolaevna [1]

Explanation:

number 1 it will be safe for future use number 2 it helps in our rest of the work

number 3 saving a file is a very good habit number for importance of saving file are a very very nice number 5 I hope it help please give me your ratings and like and also don't forget to read the brainly.com

8 0
2 years ago
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
coldgirl [10]

Answer:

The answer is "timing".

Explanation:

  • The time attack would be a security vulnerability that enables attackers that identify computer systems or network security issues by analyzing the period of the program's reaction to multiple levels.  
  • It is used in both RSA encryption and decryption of the modular exponentiation method but could be modified for just about any system not seem running in a fixed period.
6 0
3 years ago
I need help with my homework:
Likurg_2 [28]

Answer:

You need to order 11100 pizzas.

Explanation:

A couple of assumptions here.

Each pizza has 12 slices.  Each guest will eat 4 slices (1/3 of a pizza).

83 * 1/3 = 28 pizzas

28 = 11100

4 0
3 years ago
What is entered into a cell that is typically numeric and can be used for calculations? A. Value B. Function C. Label D. Tab
Greeley [361]
The answer can not be a label because it goes above the chart, and a tab doesn't have to do with a cell and a function is done without the cell so the answer is A. Value
3 0
4 years ago
Read 2 more answers
I WILL MARK BRAINLIEST IF CORRECT!!!!!!!!!!!!!!!!!!!!!!!!!!!!
e-lub [12.9K]

the second answer is correct

7 0
3 years ago
Read 2 more answers
Other questions:
  • What are words with the root gest?
    15·1 answer
  • Which wireless communication is typically limited to six feet of distance?
    6·1 answer
  • Why is it a mistake to put email addresses of people who don't know each other in the "To:" field?
    8·2 answers
  • The matrix theory is used in the ___ technique
    8·1 answer
  • On many advanced routers and switches, you can implement QoS through bandwidth management, such as __________, where you control
    5·1 answer
  • Write a function in Java that implements the following logic: Given a string and an int n, return a string made of n repetitions
    15·1 answer
  • is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members a
    14·1 answer
  • Adios brainly, wont be posting that much take my points away i d c
    13·2 answers
  • Write an algorithm to calculate the simple interest using the formula​
    7·1 answer
  • What layer is responsible for routing messages through an internetwork in the tcp/ip model?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!