1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
motikmotik
2 years ago
7

. A store and forward switching strategy is generally used in ______ switched network.

Computers and Technology
2 answers:
xz_007 [3.2K]2 years ago
5 0
The answer would be a
Zepler [3.9K]2 years ago
5 0
Packet would be the answer
You might be interested in
I need help someone plz i need it fast ..........
photoshop1234 [79]

Answer:

Do you still need help??

Explanation:

5 0
2 years ago
Read 2 more answers
Every time I try to look up anything on my laptop it keeps saying my connection is not priavte what do I do
dangina [55]

You can click "Advanced" and still proceed to the website.


Please mark this answer as the Brainliest! Thank you :)




6 0
3 years ago
Read 2 more answers
. Each ____ on a menu performs a specific action.
Fofino [41]
The answer would be d, none kf the above.
4 0
3 years ago
You have just installed a SOHO router in a customer’s home and the owner has called you saying his son is complaining that Inter
emmainna [20.7K]

Answer: A. Verify the wireless connection is using the fastest wireless standard the router supports.

D. Enable QoS for the gaming applications on the router and on the son's computer.

Explanation: Verifying the wireless connection is using the fastest wireless standard the router supports will improve line of connectivity and reduce network latency hence gaming consoles communicate faster.

QoS enables the prioritizing of the volume of internet traffic on the console for high quality gaming. QoS will also enable more internet bandwidth to be channeled to the gaming console.

6 0
3 years ago
Which of the following is the result of a query?
IgorLugansk [536]
I think the answer is A
6 0
2 years ago
Other questions:
  • What type of malware is heavily dependent on a user in order to spread?
    11·1 answer
  • COMPUTER SCIENCE:PIXELS
    5·1 answer
  • Write the definition of a function named quadratic that receives three double parameters a, b, c. If the value of a is 0 then th
    12·1 answer
  • Because many mobile devices and personal computers today are continually connected to the Internet, securing those devices again
    6·1 answer
  • All of the following are current key technology trends raising ethical issues except:_________
    13·1 answer
  • I have a problem with Instagram.
    11·1 answer
  • One common method of converting symbols into binary digits for computer processing is called ASCII​ (American Standard Code of I
    5·1 answer
  • John works in the Sales and Marketing group. Why does his group need to interact with operations management to plan the launch o
    12·1 answer
  • What is an advantage of storing data in a Data Lake, without applying a specific schema to it initially?
    10·1 answer
  • If you have created users with administrator privileges on your windows 7 or linux systems, why bother creating other user accou
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!