The most significant difference between improving an existing process and designing a new process is that as a person is completely working again on a process or designing a new process, there are known to be a lot of unknowns factors that may occur.
<h3>What is the difference about?</h3>
In working or redoing a process or designing any kind of new process, there are known to be a lot of unknowns factors.
This is said to be the most significant difference that exist between improving a process and designing a new process. This makes a lot of new processes and products to be very focus on meeting their customer's performance needs or aims.
Learn more about designing from
brainly.com/question/1212088
#SPJ1
Answer:
Redundant paths can be available without causing logical Layer 2 loops.
Explanation:
- Spanning Tree Protocol is used to allow redundancy in the Layer 2 switched networks without creating cycles/circles also called loops.
- These loops are called physical loops.
- When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop.
- This affects the performance of the network as the result of broadcast packets flooding.
- STP puts one port of the switch to forward mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to block mode and the one port that is left after this is placed in forward mode.
- Spanning Tree Algorithm is used by STP to determine the optimal path of switch to the network.
- Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.
- This information helps STP to eliminate the redundant paths.
- So this is how STP tracks all the links in the switched network and eliminates redundant loops by allowing only one active path to the destination while blocking all other paths.
I think: B,C,D. You do not need to write notes on a thing that you will only see, but you need a date, key words, and main ideas.
Answer:
Public key encryption
Explanation:
DescriptionPublic-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.
Answer:D)Conversion tracking
Explanation:Conversion tracking is the tool that helps the user to know about the interaction of the ad given by him with customer. It helps in the tracking in the ways like calls from ads, call conversion importing,mobile website gaining the number of clicks etc.
Thus, Adam needs to use the conversion tracking tool which for driving the calls towards his store.He can track the effectiveness of the ad which drives the calls.
Other options given are incorrect because they cannot keep the record of the ads seen by the customer with the help of tracking. Thus the correct option is option(D).