1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semenov [28]
3 years ago
11

The internet backbone is a foundation network linked with _____ that can support very high bandwidth.

Computers and Technology
1 answer:
slava [35]3 years ago
8 0
The internet backbone is a foundation network linked with fiber-optic cables that can support very high bandwidth. Fiber-optic cables can be compared with an electrical cable because they use the fibers to carry light and transfer information. The fiber-optics within a network help the information travel through the bandwidths at a fast, clear speed. 
You might be interested in
A(n) ________ software installation enables you to decide which features you want to install on the hard drive. Select one: A. f
Softa [21]

Answer:

D.Custom

Explanation:

When you select  Custom installation, all Compulsory subcomponents and products are installed, but the Optional and Recommended  sub-components and components can be installed selectively on a product-by-product basis for the licenses selected at install time.  It also provides the feature to store it in your desirable disk in the hard drive.

7 0
3 years ago
How to work a computer cause i don't know how to
VladimirAG [237]

Answer:

power on, connect to internet, download games

6 0
2 years ago
Tamika has received an average of 97% on all of her math tests, has done well on her homework assignments, and participates in c
sashaice [31]

Answer:

B is the correct answer.

6 0
2 years ago
Read 2 more answers
A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successf
prohojiy [21]

Answer:

The following options are true.

Explanation:

A corporation has requested the user to support minimize the brute force attacks on credentials of their Microsoft account holder's. They effectively eliminated the malware involved in those assaults and have to protect their credentials allocated towards their user profiles properly without restricting the usefulness of the program.

The following should be included in securing the user accounts are need credentials for the user profile, create logon constraints that failed as well as need powerful credentials.

7 0
2 years ago
Which of the following is a narrative essay most like
Nataliya [291]
The answer if defiantly B. Story

4 0
3 years ago
Read 2 more answers
Other questions:
  • Instructions:Select the correct answer.
    13·1 answer
  • What is constructive criticism?
    9·1 answer
  • An inventory management system that goes beyond just managing inventory to act as a complete distribution system (including inve
    10·1 answer
  • As you type your outline, click Demote to move a line of text
    13·2 answers
  • Riya wants to save her project work in an external device so that she can show it to her class teacher. Help her to choose the d
    13·2 answers
  • What should be used to keep a tablet dry?
    13·1 answer
  • Which of the following is true of how computers represent numbers?
    9·2 answers
  • Maria is creating a program where the user will enter their name to begin. What kind of variable should be used for the user’s n
    15·2 answers
  • What do u mean by generation of computer
    10·1 answer
  • A file has TWo parts name them
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!