1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kryger [21]
3 years ago
6

"As part of integrating your solution your client indicates that they have certain technologies enabled on their network that al

lows defined and flagged traffic to reach its source destination based upon the priority of the traffic. What does the client have enabled on their network
Computers and Technology
1 answer:
erastovalidia [21]3 years ago
6 0

Answer:

quality of service

Explanation:

You might be interested in
PLEASE HELP WITH MY COMPUTER
qaws [65]

Answer:

try powering it off the turn it back on

Explanation:

5 0
3 years ago
Read 2 more answers
Hi I paid for brainy plus, but it says the it can't renew and try paying for it again but it won't work. Please help
Scorpion4ik [409]

Answer:

Contact CS, ( customer support ) They should be able to help you. Go to this link for more info. brainly.com/contact/index

Explanation:

8 0
4 years ago
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
Given the char * variables name1, name2, and name3, write a fragment of code that assigns the largest value to the variable max
Assoli18 [71]

Answer:

The following code as follows:

Code:

max=name1;   //define variable max that holds name1 variable value.

if (strcmp(name2, max)>0)  //if block.

{

   max=name2;  //assign value to max.

}

if (strcmp(name3,max)>0)   //if block.

{

  max=name3; //assign value to max.

}

Explanation:

In the above code, we define a variable that is max. The data type of max variable is the same as variables "name1, name2, and name3" that is "char". In the max variable, we assign the value of the name1 variable and use if block statement two times. In if block, we use strcmp() function that can be defined as:

  • In first if block we pass two variables in strcmp() function that is "name2 and max" that compare string value. If the name2 variable is greater then max variable value so, the max variable value is change by name2 variable that is "max=name2".
  • In second if block we pass two variables in strcmp() function that is "name3 and max" that compare string value. If the name3 variable is greater then max variable value so, the max variable value is change by name3 variable that is "max=name3".

4 0
3 years ago
V to "mutual funds"?
Anettt [7]

Answer:

D. All of the above.

Explanation:

The mutual funds can be affected by the market condition, and the investor's investment can be lost. It does not provide any assurance or any guarantee that the scheme targets or the goals are going to be achieved or will not be achieved. The investment of the fund is done later, and businesses are picked up according to the wishes of the investor who creates the pool.

And they can be a smart investment for young people, and they do contain the combination of various types of stocks. And they are commonly found in the retirement accounts. Hence, all of the above points are true about mutual funds.

3 0
3 years ago
Other questions:
  • Which is NOT a type of SD card?
    8·2 answers
  • 7.
    6·1 answer
  • Which two standards below represent newer versions of stp??
    13·1 answer
  • A software license gives the owner the to use software.
    12·2 answers
  • Which user interface part shows graphical output of mined data?
    8·2 answers
  • Print ___________ command is used for adding numbers.​
    14·1 answer
  • What is the most common knowledge computer programmers need in order
    15·2 answers
  • Digital communication and production chapter 17
    6·1 answer
  • Every time a key is pressed on the keyboard, the _______________ chip in the keyboard notices which key has been pressed.
    13·1 answer
  • reagan's firm has not had to make large investments in computer or networking hardware or in personnel to maintain the hardware
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!