1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatuchka [14]
3 years ago
8

What is the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automa

tically takes over with no loss of service
Computers and Technology
1 answer:
weeeeeb [17]3 years ago
5 0

Answer:

The appropriate answer will be "Fault Tolerance".

Explanation:

  • This relates to and is therefore a device rather than a program with nothing more than a self-contained contingency mechanism that enables uninterrupted supply when key characteristics fail.
  • A system has been regarded as fault-tolerant although this keeps working satisfactory manner throughout the existence of one and sometimes more circumstances of failure.
You might be interested in
Isabel is creating a wireframe. She has drawn a layout for the home page along with outlining the navigation elements. She now w
Juli2301 [7.4K]

Answer: Filler content

Explanation: I think what the question is getting at is using filler content. This includes filler images and sample text. Once the website is all set up, the filler content is replaced with the actual content.

3 0
3 years ago
Read 2 more answers
Write an algorithm for switching off the electric water heater automatically when the temperature rises to 70 o Celsius.
noname [10]

Answer:

The algorithm for switching off the electric water heater automatically when the temperature rises to 70 o Celsius is given below.

Explanation:

Let use python code for this question.

we will use if statement to check the condition if the temperature is greater than 70.

When the temperature is 70, then the algorithm will send signal to hardware to turn yourself off.

if(temperature==70):

      print("send_turn_off_signal")

3 0
2 years ago
What are possible consequences for cyberbullying?
BaLLatris [955]

Answer:

Possible consequences for cyber bullying include depression, isolation and illness

Explanation:

The reason for this is when a person is hurt there body tends to go through things to make them feel a certain way about things.

3 0
2 years ago
Read 2 more answers
Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number for which a
myrzilka [38]

Answer: C

Explanation:

I believe this is because you cannot represent the number sixteen with only four binary bits. The highest you can go is 15.

3 0
3 years ago
when connecting to a wireless local area network (wlan), what is the most important fact about the service set identifier (ssid)
iragen [17]

The most important fact about the service set identifier (SSID) is that all the end users and all access points (AP) must be configured with matching SSIDs.

<h3>What is SSID?</h3>

SSID is an acronym for service set identifier and it can be defined as the generic name given to a wireless local area network (WLAN) connection.

In Computer networking, the most important fact about the service set identifier (SSID) is that all the end users and all access points (AP) must be configured with matching SSIDs.

Read more on wireless local area network here: brainly.com/question/13697151

#SPJ11

4 0
1 year ago
Other questions:
  • To reduce inflation, the Federal Reserve _____ the money supply. This action also causes the economy to shrink.
    13·2 answers
  • A forensic investigation discovered that accounts belonging to employees who were terminated numerous years ago were recently us
    9·1 answer
  • What is trouble shoot​
    11·1 answer
  • If a client is found _________ the NAP will attempt to make it _______. Group of answer choices A. non-compliant, compliant B. s
    13·2 answers
  • I need some help pleas hurry
    5·1 answer
  • Which of the following will increase the level of security for personal information on a mobile device if the device is lost or
    7·2 answers
  • The difference between Return key and word Wrap
    14·1 answer
  • What is the difference between algorithm and flowchart​
    7·1 answer
  • How are &lt; embed &gt; tags used in web page creation?
    5·1 answer
  • You can merge the cells using the rowspan and colspan attribute of the tag <br> true or false​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!