1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zlopas [31]
3 years ago
12

Which of the following is a way to sell the network proposal to management?Group of answer choicestalk about upgrades from 10Mbp

s to 100Mbpsgive many details about using routers vs. gateways for a particular connectionconcentrate on a discussion about token ring vs. Ethernet protocolfocus on the growth in network usediscuss SNA architecture
Computers and Technology
1 answer:
Assoli18 [71]3 years ago
5 0
Ethernet is the best in reliability and speed
You might be interested in
In which type of attack does the user respond to several external communication requests? Harry wants to watch a movie online by
Shkiper50 [21]

Answer:

They normaly do that to put a virus on your device And hack into your private info like passwords and credit cards and stuff like that

Explanation:

Always watch a movie leagly

3 0
3 years ago
The Harrison Group Life Insurance company computes annual policy premiums based on the age the customer turns in the current cal
valina [46]

Answer:

yea that is correct hope this works

7 0
3 years ago
Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and inform
gtnhenbr [62]

Answer:

True

Explanation:

It is TRUE that Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and information security infrastructure elements.

The above statement is true because Internal Monitoring is a term used in defining the process of creating and disseminating the current situation of the organization’s networks, information systems, and information security defenses.

The process of Internal Monitoring involved recording and informing the company's personnel from top to bottom on the issue relating to the company's security, specifically on issues about system parts that deal with the external network.

5 0
3 years ago
Given 3 random numbers.
Mila [183]

Explanation:

I do not know php, but can do in C/Java

8 0
2 years ago
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
Eddi Din [679]
#include
#include

using namespace std;

int CountCharacters(char userChar, string userString){
int result = 0;
for(int i = 0;i if(userString[i] == userChar){
result++;
}
}
return result;
}

int main(){
string userString;
char userChar;
cin>>userChar>>userString;
cout< return 0;
}
5 0
2 years ago
Other questions:
  • What is the disadvantage of a series circuit? A. The lights in a series circuit shine too brightly B. A series circuit can have
    8·1 answer
  • The equipment that processes data in order to create information is called the _______.
    8·2 answers
  • Select all that apply.
    8·2 answers
  • . Constructors can / cannot (circle correct choice) be called explicitly as if they were regular member functions.
    10·1 answer
  • How does a hard drive work?
    5·1 answer
  • How to write a function that counts the letters in a string in C?
    13·1 answer
  • Web crawlers or spiders collect information from Web pages in an automated or semi-automated way. Only the text of Web pages is
    10·1 answer
  • ON QUIZ PLEASE HELP
    13·1 answer
  • You can easily view the ruler on a document by selecting the Show Ruler button located _____.
    11·2 answers
  • Carlie was asked to review a software project for her company to determine specific deadlines. Which part of project management
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!