1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
3 years ago
12

An Internet Service Provider (ISP) is a company that builds the routers and wired connections that allow individuals to access t

he Internet.
An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the company would choose to do so?
A. It costs less to design a network that is redundant
B. The protocols of the Internet only work on networks that are redundant
C. Redundant networks are more reliable
D. Adding additional connections reduces the fault-tolerance of the network
Computers and Technology
2 answers:
Naddika [18.5K]3 years ago
5 0

Answer:

a

Explanation:

It costs less to design a network that is redundant

grigory [225]3 years ago
4 0

Answer:

The answer is C

Explanation:

A redundant network is more reliable as having redundancy provides a backup for when a part of a network goes down.

You might be interested in
Which process could you use to add a table to a document?
Lady_Fox [76]
These are the steps you would take..

click on insert at the bar on the top of the document  processor (Word,Google Docs ect.) >>Click table drag as many columns and rows as you need!
I hope this helps!
6 0
3 years ago
What are 2 ways to access the vendor credit screen in quickbooks online?
kiruha [24]

Answer:

First by

Clicking

New Button (+) THEN click Vendor THEN click Credit

Secondly

Click Expenses Center then click New Transaction then finally click Vendor Credit

4 0
3 years ago
He should identify his various
joja [24]

Answer:

false, that shouldn't be a a priority to identify if they are or not.

Explanation:

3 0
3 years ago
can someone tell me what to do i’m kinda stuck and don’t know what he’s telling me to do pls ill give brainlist and points
Alexandra [31]

Answer:

Well a debtor is basically someone owing someone money, basically someone in debt. He’s telling cup head boy to take care of the people who owe him or someone else their or his money. Thats basically it.

8 0
3 years ago
The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is
rewona [7]

Answer: Access control

Explanation:Access control is the type of security facility that is provided to the systems in an organization. The functions carried out in maintaining the security of the system is done by authenticating , authorizing and identification of the users and related components . They are secured using the PINs , passwords, bio-metric scan etc.

The situation of the user wanting to have a unrestrained access towards data as well as maintaining the security is the done by access control.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Read three integers from user input. Then, print the product of those integers. Ex: If input is 2 3 5, output is 30. Note: Our s
    6·1 answer
  • The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IE
    12·1 answer
  • A direct-mapped cache holds 64KB of useful data (not including tag or control bits). Assuming that the block size is 32-byte and
    14·1 answer
  • What is a ribbon in word
    15·2 answers
  • Which symbol is at the beginning and end of a multiline comment block? ### &&& %%% """
    14·1 answer
  • Management of software development consist of?
    15·1 answer
  • You implement basic version control and go through the phase of creating a local repository. Initiate the commands to set up tha
    7·1 answer
  • Have y’all beat shinobi 3 return of The ninja Master for The sega genesis
    5·1 answer
  • How do you increase the number of tries by one?
    10·1 answer
  • What was Ada Lovelace's contribution to computer science?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!