1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Charra [1.4K]
3 years ago
12

What are the benefits of building redundancy into a network?

Computers and Technology
1 answer:
Vinil7 [7]3 years ago
3 0

Answer:

By providing additional or alternate equipment, or planning alternate network paths, you ensure availability in the case of device or path failure. Building in redundancy gives you a network failover to avoid an extended outage (AKA, disaster recovery).

You might be interested in
Do applications need to exchange udp control messages before exchanging data
Molodets [167]

The answer is NO.

Thats what makes UDP connectionless. Aclient that is going to send a UDP message to the server just sends it.The server does not know it is coming untill it arrives .When a server recieves a UDP message it gets the source address/port and the data.

7 0
3 years ago
. Mercury, Venus, Earth, and Mars are the closest planets to the Sun
DIA [1.3K]

Answer:

<h3>True</h3><h2>Mercury  is the nearest</h2>

Explanation:

I hope this helps

4 0
3 years ago
Secure Hashing Algorithm (SHA) is an algorithm for generating cryptographically secure one-way hash, published by the National I
Naily [24]

Answer:

64 byte.

It's not bit is byte.

Explanation:

Secure Hash Algorithms (SHA) :- These are a family of cryptographic hash functions. There are basically four types of secure hash algorithms for generating cryptographically secure one-way hash.They are as following:-

SHA-0

SHA-1

SHA-2

SHA-3

SHA -2 consists of SHA-512 and the block size used by it is 64 byte or 512 bits.

8 0
3 years ago
The ____ data source class that reduce your need for accessing individual Data Provider class when you are connecting to an Acce
olasank [31]

Answer:

AccessDataSource

Explanation:

6 0
3 years ago
Users of an extranet can access a company or organization's entire intranet.
Vlad [161]
True............................I think
7 0
3 years ago
Read 2 more answers
Other questions:
  • Vpns create a _____________ to transport information through public communications media.
    8·1 answer
  • 7. What is the school campus’s setting<br> the school is sanford
    6·2 answers
  • The default color scheme is called ____.
    7·1 answer
  • Which layer enables the receving node to send an acknowledgement?
    11·1 answer
  • When one method calls another, which of the following statements are true?
    13·1 answer
  • When you connect a new hardware device to your computer, the operating system uses a feature called _______ so you can use the n
    6·1 answer
  • 2. Which Interface uses
    7·1 answer
  • Is there any website online to use android studio live?​
    11·1 answer
  • Write a method in pseudocode or Java called move that accepts a boolean[], integer value, and a boolean value. Your method shoul
    15·1 answer
  • Can someone help: how to get binary?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!