1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
3 years ago
12

An Internet Service Provider (ISP) is a company that builds the routers and wired connections that allow individuals to access t

he Internet.
An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the company would choose to do so?
A. It costs less to design a network that is redundant
B. The protocols of the Internet only work on networks that are redundant
C. Redundant networks are more reliable
D. Adding additional connections reduces the fault-tolerance of the network
Computers and Technology
2 answers:
Naddika [18.5K]3 years ago
5 0

Answer:

a

Explanation:

It costs less to design a network that is redundant

grigory [225]3 years ago
4 0

Answer:

The answer is C

Explanation:

A redundant network is more reliable as having redundancy provides a backup for when a part of a network goes down.

You might be interested in
Many of the first photographers were actullay scientists and inventors
scoray [572]

Answer:

True, if its a true or false. Otherwise I am of no help.

Explanation:

5 0
3 years ago
Design and document an IP addressing scheme to meet ElectroMyCycle’s needs. Specify which IP address blocks will be assigned to
noname [10]

Answer:

Given that: Design scenario - page 197 has a continuation of the chapter 1 design scenario for ElectroMyCycle

Explanation:

See attached image

7 0
3 years ago
In a ___ traversal of a binary tree, you begin at the root and visit nodes one level at a time
svp [43]

Answer:

The answer of the given question is Inorder.

Explanation:

In the inorder traversal the binary tree start from the root and visited all the vertex in the tree .

The inorder follow the following Algorithm

1. Traverse in the left subtree.

2 Print the data (visit the node ).

3 Traverse in the Right subtree.

8 0
4 years ago
A password checking system that disallows user passwords that are proper names or words that are normally included in a dictiona
nikdorinn [45]
The answer is control
7 0
3 years ago
Brainliest
olya-2409 [2.1K]

Answer:

browsing history

Explanation:

....

6 0
3 years ago
Read 2 more answers
Other questions:
  • Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
    6·1 answer
  • Someone who is young, lacks funds, and really wants to gain technical skills while serving his or her nation should consider
    8·1 answer
  • ________ gives its approval to U.S. e-commerce websites that follow strict privacy standards, such as explaining to visitors how
    6·1 answer
  • When examining the digital evidence, what stage deals with using keyword searches and file-carving utilities to locate data that
    5·1 answer
  • Consider the following code segment: ArrayList bulbs = new ArrayList(); bulbs.add(new Light()); bulbs.remove(0); bulbs.add(new L
    15·2 answers
  • Which industry has the highest employment figure for both teen and young adults in July, 2014?
    6·1 answer
  • B) If you send me an email, then I will finish my program. If you do not send me an email, then I will go to sleep early. Theref
    10·1 answer
  • How do governments correct for negative externalities?
    5·1 answer
  • Write an application that allows a user to input the height and width of a rectangle. It should output the area and perimeter of
    10·1 answer
  • Identify the network and the host address in the ip address of 12.128.120.131 with a subnet mask of 255.128.0.0.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!