1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VARVARA [1.3K]
3 years ago
15

These factors influence the design of a network.

Computers and Technology
2 answers:
REY [17]3 years ago
8 0
Availability ,devices and applications, performance, security, scalability.
Stels [109]3 years ago
8 0

Answer:

Below are the factors.

Explanation:

Connectivity & Security, Redundancy & Backup, Standardization of hardware & software, Disaster Recovery Plan , and Growth of the organization in future.

Cheers

You might be interested in
A _______ is a collection of software routines that can be used by other software. Licensing terms for this type of software are
tensa zangetsu [6.8K]

Answer: library

Explanation:

A library refers to the collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

It is the collection of non-volatile resources that is used by computer programs, usually for the development of software.

8 0
2 years ago
Hi, I need help on a Circle Class Assignment that is due today. If anyone could please help me, I would greatly appreciate it. I
nikklg [1K]

Answer:

hmmm lets see

Explanation:

7 0
3 years ago
Can you answer this ?​
beks73 [17]

Answer:

Answer it yourself.

Explanation:

NO.

4 0
3 years ago
Read 2 more answers
Graphical elements that precede each item in a list are known as​ __________.
Vanyuwa [196]

The answer in the space provided is the bullets as this is the graphic elements that are used in each items that is organized in a list in a way of making the list more clearer and more presentable with the given indications or symbols.

4 0
3 years ago
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a d
Alecsey [184]

Answer:

Promiscuous mode

Explanation:

6 0
3 years ago
Other questions:
  • True or false words spelling and grammar check is always %100
    7·2 answers
  • On what basis can you categorize the generations of computers
    7·1 answer
  • On the basic of size, in how many groups do we classify the computers? Name them.<br>.​
    5·1 answer
  • _____ is a secret or illegal cooperation or conspiracy, especially in order to cheat or deceive others.A.CollusionB.Business eth
    12·1 answer
  • A user deletes a message from a mailbox while on a desktop. What happens to the email message on the user's synchronized devices
    13·2 answers
  • Given the function definition below, what is the effect of thecall:
    7·2 answers
  • What specific database stores local user accounts on local computers, and allows users to sign in to and access resources only o
    9·1 answer
  • The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling int
    9·1 answer
  • Which type of software has no restrictions from the copyright holder regarding modifications of the softwares internal instructi
    12·1 answer
  • Explain how SEO impacts the way you should interpret search engine results ???
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!