1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivenika [448]
3 years ago
6

What aspect of the internet makes it fault-tolerant?

Computers and Technology
1 answer:
Dvinal [7]3 years ago
6 0

Answer:

The correct answer is mesh design

Explanation:

I just took the quiz

You might be interested in
For Adults/Adolescents, you should call/activate EMS: Before providing CPR. After providing CPR for 2 minutes. After an AED has
defon

Answer:

Before providing CPR is the correct option.

Explanation:

CPR refers to the cardiopulmonary resuscitation in which the user follows the emergency treatment of respiration from mouth to mouth and chest compression. If any person complete training of Adults/Adolescents then they have to activate or call the EMS before providing cardiopulmonary resuscitation.

6 0
3 years ago
Using your own computer, give the name of the operating system that runs it and give examples of five legal file names. Then cre
Vika [28.1K]

Answer:

Name of Operating System: Ubuntu

Five legal file names:

inventory.txt

total.txt

NIKKAH.txt

Defaulter.txt

studenT.txt

Five illegal file names:

wel/come.txt

..

MY>note.txt

.

my<work.yxt

Explanation:

To fix the illegal name:

1. Remove the special character, so it becomes welcome.txt

2. Remove the double dot and rename using text characters

3. Remove the special character, so it becomes MYnote.txt

4. A file cannot be named using dot. So we rename to a textual name

5. Remove the special character, so it becomes mywork.txt

Some additional rule for naming of files legally in Unix is that, you cannot use a reserved word to name your file. Starting a file name with number is allowed. Starting a file name with dot make the file to be hidden.

7 0
3 years ago
This computer is used by touching your finger.
Marrrta [24]

Answer:

a tablet because it's controlled by the touch of a finger.

8 0
3 years ago
The goals of _____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate a
Vitek1552 [10]

Answer:

volume testing hope this helps :)

7 0
3 years ago
"Your supervisor has asked you to modify the AMOUNT column in the ORDERS table. He wants the column to be configured to accept a
vesna_86 [32]

Answer:

ALTER TABLE orders

MODIFY (amount DEFAULT 250)

Explanation:

  • ALTER TABLE statement is used to modify "amount" column in the existing "orders" table  
  • MODIFY (amount DEFAULT 250) is used to set the default value 250 of the "amount" column.

Therefore if the supervisor wants the amount column to be configured to accept a default value of 250, then "ALTER TABLE orders MODIFY (amount DEFAULT 250) " statement should be issued.

5 0
3 years ago
Other questions:
  • Why do computers need to periodically check the dns for websites you have already visited? enter your answer here?
    15·1 answer
  • In these weeks readings, we learned about the CIA Triad and how each exhibits dependence on the other. Give examples of how fail
    12·1 answer
  • Please Do Solve it guys...
    6·1 answer
  • The command button to protect a document is part of the​.
    10·1 answer
  • Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organ
    14·1 answer
  • Select the tips you should follow when writing a business report.
    12·1 answer
  • What would a digitizing application create?
    13·2 answers
  • JAVA NEED HELP ASAP
    7·1 answer
  • Digital communication and production chapter 17
    6·1 answer
  • A user has become compromised as a result of visiting a specific web page, without clicking on any kind of content. What type of
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!