1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prohojiy [21]
3 years ago
13

Me podrian ayudar con esta pregunta...

Computers and Technology
2 answers:
tamaranim1 [39]3 years ago
8 0
The answer is B , Hope this helps , I don’t speak Spanish but a little bit I understand , I’m sure that’s the correct answer answer
kvasek [131]3 years ago
4 0

Answer: Descentralizados (B)

Explanation:

You might be interested in
Now suppose there are four links between source and destination (three routers in the path between source and destination). Each
pychu [463]

Answer:

12.1 seconds

Explanation:

Step 1:

Assuming the following data :

N: Size of packet = 30 Mb

T: Transmission rate =  10 Mbps

C: Speed of light in copper = 2 * 10^8 m/s

L: Length of link 5000 km

Step 2:

Calculation of the Transmission delay and the Propagation Delay

Transmission delay = \frac{packet size}{bandwidth} = \frac{30Mb}{10Mbps} = 3s

Propagation delay = \frac{length of link}{speed of light in copper} = \frac{5000*10^3}{2 * 10^8} = 0.025s

Step 3:

Calculation of the end-to -end delay

The end-to-end delay = 4*(Transmission Delay+Propagation Delay) = 4*(3+0.025) = 12.1 seconds

6 0
4 years ago
What's the drawback of using Screened Subnet (DMZ)?
lesantik [10]

It's more expensive, it's more difficult to configure and maintain and it can be more difficult to troubleshoot

4 0
4 years ago
Who was the founder of the location-sharing site Whrrl
Lilit [14]
By Pelago, INC. Founders of Pelago are: Jeff Holden<span> and </span><span>Darren Vengroff.</span>
3 0
3 years ago
Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario,
sladkih [1.3K]

Answer: d) Illegal and unethical

Explanation:  Illegal term is used for the something that is incorrect according to regulation.The legal factor is not present in this type of activity and thus it is judged by the regulations as unauthorized act and can be concluded as act of crime .

Unethical term defines that something is incorrect in a moral way and the person doing the unethical activity lacks the principles in his/her nature.

Jared is also performing illegal act by selling the piracy  antivirus package of software .The act is unethical as well because Jared is lacking the basic morals e.g.-stealing is offensive and incorrect act.Thus the correct option is option(d).

Other options are incorrect because the  act done by Jared is against the conduct which is not legal and ethics are moral features which is not present in Jared's act.

5 0
3 years ago
when web services are offered outside the firewall, traffic is prevented from reaching the internal networks via the implementat
Tju [1.3M]

An isolated networking space or sub-network that is isolated from the rest of the organization's connected footprint using logical or physical blocks to enable access to untrusted connections in a safe environment is referred to as a demilitarized zone (DMZ).

Demilitarized zones are secluded network areas that provide as a secure link between proprietary and non-proprietary networks within an organization's perimeter. It stops unauthorized traffic from entering the internal local area network of a business. A demilitarized zone (DMZ) is a region where warring parties have agreed to put their differences aside in order to create peace. An example of a DMZ is the little sliver of territory that divides North and South Korea on the Korean Peninsula.

Learn more about demilitarized here-

brainly.com/question/7933837

#SPJ4

3 0
1 year ago
Other questions:
  • write a pseudo code and flow chart that take a number as input and prints multiplication table up to 10
    9·1 answer
  • The hotspot created by MiFi is password protected and can be used to connect Wi-Fi devices located within ____ feet of the MiFi
    9·1 answer
  • True or False: From an antiterrorism perspective, espionage and security negligence are considered insider threats.
    14·2 answers
  • Rita wants to know the size of each image in a folder. Which view will help her find this information quickly?
    13·1 answer
  • Which type of computer network ensures high security
    10·1 answer
  • When a chart is selected, numerous customization options can be found on which Chart Tools tabs?
    11·2 answers
  • Create a winform application that lets the user enter a temperature. With a ComboBox object offer the user three choices for inp
    9·1 answer
  • Java: Programming Question: Reverse OrderWrite a program that reads ten integers into an array; define another array to save tho
    10·1 answer
  • Please Complete in Java a. Create a class named Book that has 5 fields variables: a stock number, author, title, price, and numb
    10·1 answer
  • what is cicada 3301? i will give brainliest if you give me a correct answer (not copy and pasted) and somewhat well detailed, i
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!