1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
chubhunter [2.5K]
3 years ago
5

4. Assuming that social networking at the resorts will require wireless communication and connection to the Internet, what are s

ome reliability requirements that resorts might be asked to maintain? What are some performance requirements? Is this a bigger issue because resorts are in international locations?
Computers and Technology
1 answer:
Studentka2010 [4]3 years ago
8 0

Answer:

Social networking capabilities could be made available by the presence of SBRUs central servers and local resort's server. For resorts that are using SBRU servers, there will be high bandwidth access to the internet. This can create a service level of 100% availability. However, for the resorts with high usage clients, a local server could be provided. Similar support will be needed and it will encourage local communication. The possible issues will be problems of connectivity, reliability as well as bandwidth.

Explanation:

Social networking capabilities could be made available by the presence of SBRUs central servers and local resort's server. For resorts that are using SBRU servers, there will be high bandwidth access to the internet. This can create a service level of 100% availability. However, for the resorts with high usage clients, a local server could be provided. Similar support will be needed and it will encourage local communication. The possible issues will be problems of connectivity, reliability as well as bandwidth.

You might be interested in
Which button would you use to quickly add addresses to a mail merge envelope?
Jet001 [13]

The answer to your question is,

C. Address Block

-Mabel <3

5 0
4 years ago
The ________ Web, originally envisioned by Tim Berners-Lee, one of the founders of the Internet, is a set of design principles t
shusha [124]

Answer:

The answer is "Semantic".

Explanation:

It can be designed as an enhanced country-wide mobile version and represents a useful way to view the information as a globally connected database.

  • It is the network of information, that can be linked and processed effectively by machines instead of by human workers.
  • It is one of the creation of the Web, which is originally imagined a series of concepts, that allowed machines to better index websites, issues, and subjects.
4 0
3 years ago
How do I calculate this square footage?
Paul [167]

Answer:

To calculate it, you have to break it apart. Sorry for the bad writing but after you break it apart, you multiply the smaller squares. Then with all of the smaller areas, add them together for the final answer which in this case is 456.

4 0
3 years ago
Owen is writing a program that will lock his computer for one hour if the incorrect password is entered more than five times. Ha
kiruha [24]

Answer:

Your answer is <em>I think </em>A) A loop

Explanation:

In computer programming, a loop is a sequence of instruction s that is continually repeated until a certain condition is reached.

5 0
3 years ago
If you were an attacker who wanted to gain access to a network, would you focus on breaching technical controls for applying soc
katrin2010 [14]

Answer:

Baiting. As its name implies, baiting attacks use a false promise to pique a victim's greed or curiosity. ...

Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. ...

Pretexting. Here an attacker obtains information through a series of cleverly crafted lies. ...

Phishing. ...

Spear phishing

Explanation:

thank me later

7 0
3 years ago
Other questions:
  • One of the best examples of outcome control is the re-hiring of Steve Jobs by Apple as CEO
    14·1 answer
  • Tara has found a CTSO she’s interested in joining. How can Tara become a member of the CTSO? Tara can become a member of the CTS
    8·2 answers
  • I found a random Nether Portal in my Minecraft Singleplayer world. Why is it there?
    8·2 answers
  • If a computer is capable only of manipulating and storing integers, what di themselves? How are these difficulties overcome
    13·1 answer
  • What is character referencing and why is it used?
    8·1 answer
  • You would like to find the average of cells C2, C3, and C4. What should the formula look like? = C2+C3+C4*3 =C2+C3+C4/3 =(C2+C3+
    15·2 answers
  • Match the component to its function. resistor inductor capacitor battery transistor This component stores a temporary charge. ar
    7·2 answers
  • Who when and why developed python​
    9·2 answers
  • What kind of electronic communication might commonly be affected by citizen journalism?
    9·1 answer
  • You suspect that a bad video driver is causing a user's system to randomly crash and reboot. Where would you go to identify and
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!