1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horrorfan [7]
3 years ago
15

Ensuring the uninterrupted flow of information' describes which key communications and information systems principle?

Computers and Technology
2 answers:
Harlamova29_29 [7]3 years ago
8 0

Answer: C) Resilience and Redundancy

Explanation:

  • According to the principle of communication and information system , redundancy is the factor that maintains the continuous flow of message or data even when failure is experienced in network by adding alternate or extra component in infrastructure for support.
  • Resilience is the factors that helps network to persist even in the state of faults by keeping the main function working and recovering the fault to maintain the flow of data.
  • Other options are incorrect because security is protection of data. Reliability factor means dependency , scalibility is changing scale of network and portability is changing position of components. Interoperability is exchanging information with devices and making use of it.
  • Thus, the correct option is option(C).

tia_tia [17]3 years ago
8 0

Answer:

C. Resilience and Redundancy

Explanation:

Robust systems are characterized by having the ability to maintain their essential performance conditions despite receiving disturbances or noise. Robustness is the ability of a system to absorb stress and continue functioning, particularly when the system is subjected to unpredictable variations in its scope of performance.

The redundancy, consisting of the duplication of the critical components of a system, is developed with the purpose of granting robustness to the systems, so that in the event of the failure of a component that could jeopardize the main task or objective of the system, there is an alternative capable of replacing the system that suffers from a failure.

Robustness or resilience is characterized by two important aspects, the first is resistance to change or flexibility that is expressed as the ability of a system to resist a disturbance without undergoing irreversible change and the second is the ability of a system to recover.

You might be interested in
Kayla is working on a document for her business meeting. She wants to save this document with another name. Which option should
Fittoniya [83]
Kayla could use “save as” to rename the document.
5 0
3 years ago
a flow chart is the _______ representation of the sequence of steps required of steps required to solve a particular problem​. I
Eddi Din [679]

Answer:

A flowchart is simply a graphical representation of steps. It shows steps in sequential order and is widely used in presenting the flow of algorithms, workflow or processes. Typically, a flowchart shows the steps as boxes of various kinds, and their order by connecting them with arrows.

7 0
3 years ago
I have a question, but it's not a math question. Can anyone give me 5 unblockers for school computers? If you answer this, you w
ValentinkaMS [17]

Answer:

I mean if your talking about games then just try Cool math I will give link in comments

Explanation:

4 0
2 years ago
Read 2 more answers
What type of social worker provides proctection for children and help for families
Daniel [21]

Answer: Child welfare

Explanation: social workers can work for Child Protective Services and/or child welfare agencies at the county and state levels.

5 0
3 years ago
Read 2 more answers
You are the information security officer at a medium-sized company (1,500 employees). the cio asks you to explain why you believ
Ivahew [28]
If your CIO asks such a stupid question run for the hill, he should not hold that title.
Every company, small, medium or large should have Firewalls, Intrusion Detection, Managed Virus Protection Software at the very least. Windows is the most deployed OS in the world and of course the main target of hackers i.e Viruses. MAC's to a lesser extent and Unix while probably the least vulnerable are still not immune to Viruses/Trojan and other Malware.

Users can still be the victims of trojan horses, phishing scams, and other online fraud. There<span> is no such thing as a 100% safe computer, a </span>Mac<span>, Windows, and even Linux are all capable of being infected with a </span>virus<span> or other malware.
</span>
Lastly, physical access to any computer that is not encrypted is vulnerable.
5 0
3 years ago
Other questions:
  • PC’s &amp; More has shifted to sales and service of laptops and PCs, where it has the potential to triple the number of its cust
    14·1 answer
  • The main differences between laptops and desktop computers other than size and portability.
    14·1 answer
  • numbers that the user inputs. You must use JoptionPane to input the three numbers. A first method must be called and used to dev
    13·1 answer
  • The default primary key for an access database is the id field true or falser
    7·1 answer
  • How can a Word user insert a page break into a document to isolate a table on a new page?
    13·2 answers
  • How many address bits are needed to specify each byte in a 512 byte memory unit?
    5·1 answer
  • Suppose that the following elements are added in the specified order to an empty binary search tree: Lisa, Bart, Marge, Homer, M
    5·1 answer
  • In addition to regular watch features, which two features are often found on smart watches?
    10·1 answer
  • Is the address 7b invalid regarding cell references?
    8·1 answer
  • Characteristics of partial copy sandboxes versus full sandboxes? choose 2 answers
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!