1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Burka [1]
3 years ago
8

You work for a large enterprise company that handles time-sensitive information. Your supervisor has asked that you set up a con

nection to be kept in stand-by until emergencies. He requests that the line have at least 1.544 Mbps for bandwidth. Describe what technology and format you'll want to use, and why this is the ideal choice for the situation described.
Computers and Technology
1 answer:
Ivahew [28]3 years ago
7 0

Answer:

Answer explained below

Explanation:

The technology that I would be using is GPON (Gigabit Passive Optical Network).

The reason of choosing such thing is because it is a fully dedicated high speed network and it requires a fiber cable (FTTH) to build such connection. Fiber cables are really powerful in transmitting heavy loads of data and it's disconnection issues are quite rare.

A connection of 10 Mbps (minimum allotted), would be sufficient enough since we require a minimum of 1.544 Mbps. According to my perspective this is an ideal choice because it is important for larger companies to have large networks to decline any lag or disconnection during their working hours.

You might be interested in
Which of the following is NOT a rule you should follow when creating a presentation?
Nataly_w [17]
False, Write in full sentences and paragraphs on your slides - It is your presentation! Make it how you want to 
8 0
3 years ago
Common separators or delimiters used when converting a table to text include _______________________ , paragraph marks, or comma
Anon25 [30]

Answer:

tabs.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.

In Microsoft Word 2019, the users are availed with the ability to edit the word document in the following view type;

I. View Mode.

II. Print Mode.

III. Drift Layout.

To easily and quickly convert text to tables in Microsoft Word, you should insert common separators between the text columns. The common separators or delimiters used when converting a table to text include tabs, paragraph marks, or commas.

Tabs or commas are used to indicate where the texts are divided into table columns while paragraph marks indicate where a new table row begins.

6 0
3 years ago
Public class SomeClass { private String aName; private int aNumber; private boolean amAwesome; public SomeClass(String name, int
scoray [572]

Answer:

The objects created in the main method and their initial states are given below

Explanation:

The objects and initial state of each object( the values of each object’s variables) are thus:

We have objects awesome, amazing and fantastic.

initial state of awesome object is

aName = "Awesome"; aNumber = 5; amAwesome = true;

initial state of amazing object is

aName = "Amazing"; aNumber = -10; amAwesome = false;

initial state of fantastic object is

aName = "Fantastic"; aNumber = 11; amAwesome = true

3 0
3 years ago
You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for he
AlexFokin [52]

Answer:

ECC memory

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the best type of RAM for this situation would be ECC memory (RAM). This abbreviation refers to Error-Correcting-Code, this memory can detect and correct many common types of errors, and is used mainly for servers or when sensitive data is involved where errors and data corruption cannot be allowed to happen under any circumstance.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

3 0
3 years ago
Which of the following functions needed to implement the information security program evaluates patches used to close software v
solong [7]

Answer:

a. Systems testing

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the term being defined is called System Testing. Like mentioned in the question, this is a technique used in order to evaluate the complete system the system's compliance against specified requirements, which tests its functionalities from an end-to-end perspective in order to evaluates patches used to close software vulnerabilities and make sure it complies with all policies.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Other questions:
  • After calling the customer service line of Delta airlines, Francis received an email asking her to fill out customer satisfactio
    9·1 answer
  • Which of the following is an encryption tool that allows users to encrypt files and folders by simply right-clicking a given obj
    10·2 answers
  • PLEASE HELP
    12·2 answers
  • Technician A says that the TP sensor signal voltage should be about 0.5 volt at idle and increase to about 2.5 volts at wide-ope
    8·1 answer
  • What will be displayed after the following code is executed? def pass_it(x, y): z = x*y result = get_result(z) return(result) de
    13·1 answer
  • A list of the available non keyboard characters can be seen in windows by opening what utility
    7·1 answer
  • Which of these is an advantage of having multiple layers in a drawing and enables you to make changes to one part of an image wi
    14·1 answer
  • Write a program that accepts two numbers R and H, from Command Argument List (feed to the main method). R is the radius of the w
    11·1 answer
  • A data analyst is using the Color tool in Tableau to apply a color scheme to a data visualization. They want the visualization t
    13·1 answer
  • Why do you want to work for Rev?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!