1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
motikmotik
3 years ago
7

. A store and forward switching strategy is generally used in ______ switched network.

Computers and Technology
2 answers:
xz_007 [3.2K]3 years ago
5 0
The answer would be a
Zepler [3.9K]3 years ago
5 0
Packet would be the answer
You might be interested in
A site structure that contains multiple links to individual pages, allowing visitors to go through multiple paths to the site is
DanielleElmas [232]

Answer:

A site structure that contains multiple links to individual pages, allowing visitors to go through multiple paths to the site is called <u>Multidimensional website architecture</u>

Explanation:

There are different types of website architecture. One of them is multidimensional website architecture. In Multidimensional architecture, Multiple links of the websites pages are given on the a page and each page contain the multiple links of the website. in this architecture from any page of the website we can access the other page of the website.

for example

On Wikipedia, we search some topic named as website architecture, the website architecture shows on the screen. On this page, there are different link of pages such as sequential website architecture, multidimensional website architecture and Hierarchical website architecture. If click one of the link such as Hierarchical website architecture, the page of Hierarchical website architecture will open and show on the screen. This page also contains different pages links. These links may include the main page link of website architecture. This is called Multidimensional Architecture.

7 0
3 years ago
Discuss why diffrent user interface require the use of diffrent type of input device<br>​
Bas_tet [7]

Discuss why different user interfaces require the use of different types of input device. Page 15. What is Secondary Storage? List 3 Storage Mediums: What is ...

mark me brain list

7 0
2 years ago
How do most business applications and websites process credit card transactions?
klasskru [66]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Most business applications and websites use and process the credit card for their transaction.

For example, e-commerce website such as ali baba, am a zon, accepting credit card transaction when the customer gets to purchase any product from their stores. Their transactions are processed by in house credit card apps/service. But these apps/services owned by a third party. They just give you API services and related code to integrate the credit card services.  

By using their in-house credit card apps/services, they know that user has transferred the money into their account for the purchased product, upon receiving payment confirmation, they then prepare and dispatch the order.

So, the correct answer to this question is:

To process the credit card transactions, they license third-party credit card apps/services backed by the internet merchant who is responsible for handling and managing the money of the business account.    

6 0
3 years ago
A manufacturing company has several one-off legacy information systems that cannot be migrated to a newer OS due to software com
Digiron [165]

The resiliency technique which would provide the aforementioned capabilities is: D. Full backups.

An operating system (OS) can be defined as a system software which is pre-installed on a computing device, so as to manage or control software application, computer hardware and user processes.

In this scenario, a manufacturing company cannot migrate its several one-off legacy information systems (IS) to a newer operating system (OS), due to software compatibility issues.

Resiliency can be defined as a measure of the ability of a network, server, storage system, computing system or data center, to recover quickly and continue operating when it experience adverse conditions such as:

  • Power failure.
  • Equipment failure.
  • Data loss.

In Computers and Technology, there are four (4) main resiliency technique and these include:

I. Redundancy.

II. RAID 1+5.

III. Virtual machines.

IV. Full backups.

Full backup is a resiliency technique which create backups of the systems for recovery and it allows operating system (OS) patches to be installed on computer systems.

Read more: brainly.com/question/17586013

3 0
2 years ago
Olivia has developed a great presentation with a distinct purpose and excellent content. She delivered it in a workshop and got
Umnica [9.8K]

less time and depth is required for panel discussions

3 0
3 years ago
Other questions:
  • The main differences between laptops and desktop computers other than size and portability.
    14·1 answer
  • In the U.S. highway numbering system, north-south routes have
    9·2 answers
  • Your boss wants to utilize some sort of cloud storage for his files so that all of his
    10·2 answers
  • The chief reason that family and friends are frequent targets of aggression is that
    6·1 answer
  • ........ is a formal description of message formats and the rules for exchanging those messages
    12·1 answer
  • How many clients has<br> Accenture engaged globally on blockchain?
    12·1 answer
  • How to convert meters to centimeters in c programming​
    8·1 answer
  • I NEED THIS ASAP PLS
    12·1 answer
  • SmartArt is a Microsoft Office tool for creating what?
    11·2 answers
  • he attributes for an iframe are controlled by CSS. One of the iframe controls is "seamless." This means it _____. will blend the
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!