1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Burka [1]
3 years ago
5

Which solution eliminates the need for dedicated high-speed WAN connections between sites

Computers and Technology
1 answer:
s344n2d4d5 [400]3 years ago
4 0

Answer:

running in the 90 s intensifies

Explanation:

You might be interested in
Se le conoce así cuando el analista mismo desarrolla el software necesario para implementar el diseño
kari74 [83]

Answer:

Desarrollo de software.

Explanation:

El método clásico de desarrollo de software se denomina modelo en cascada, lo que significa que cada fase de desarrollo del programa debe completarse antes de que comience la siguiente, y que se lleva a cabo un extenso trabajo de especificación antes de que comience el desarrollo real del programa. La especificación es tradicionalmente de arriba hacia abajo y el desarrollo se basa en una programación estructurada, es decir, se formula primero un objetivo final para el proyecto, y luego el programa se divide gradualmente en partes funcionales más pequeñas.

Los métodos más nuevos son ágiles y basados ​​en pruebas. Se basan en el desarrollo gradual de muchas entregas parciales del programa y permiten que las distintas fases de desarrollo se lleven a cabo de forma cíclica o en paralelo. Los clientes y usuarios ganan influencia a lo largo del proceso de desarrollo. El desarrollo y las pruebas de prototipos comienzan lo antes posible, antes de que estén listos todos los detalles de la especificación de requisitos. Las decisiones sobre la especificación de requisitos de las versiones de entrega se toman lo más tarde posible, cuando los usuarios han probado y comprendido lo que realmente quieren y existe un buen conocimiento de las necesidades, posibilidades técnicas y dificultades. Cambia entre el método de arriba hacia abajo (para comenzar desde el propósito y el objetivo) y el método de abajo hacia arriba (para comenzar con lo que ya tiene y puede reutilizar, y comenzar con casos especiales simples pero gradualmente hacer que el programa sea cada vez más general).

4 0
3 years ago
A call center company wants to implement a domain policy primarily for its shift workers. The call center has large groups with
Ulleksa [173]

Answer:

D) Time-of-day restrictions

Explanation:

Based on the goals that the call center company is trying to accomplish it can be said that the best solution would be to implement Time-of-day restrictions. This would mean that only certain groups would be active at specific times during the day, thus allowing the company to focus on each group individually in order to monitor their group performance.

3 0
4 years ago
Information technology student Roberta has been assigned a project on how to detect unwanted outgoing attacks. Which step is par
tino4ka555 [31]

The attacks from the malware and the viruses to the system are considered as the unwanted attacks. These attacks detection can be performed by ensuring whether the system responds to port 443 by initiating Apache.

<h3>What is the function of port 443?</h3>

The port 443 in the computer system is the virtual port that functions with the diversion of the network. The presence of the unwanted attack blocks the response of the port 443.

Therefore, to detect the attack, the response of the system to port 443 with the starting of Apache must be checked.

Learn more about port 443, here:

brainly.com/question/13140343

#SPJ1

5 0
2 years ago
He memory unit of a computer has 2 20 words. The computer has instruction format with four fields; an operation code field, a mo
Mashutka [201]

Answer:

Opcode = 3

Mode =2

RegisterRegister =7

AR = 20

Explanation:

a) Number of addressing modes = 4 = 22 , So it needs 2 bits for 4 values

Number of registers = 65 = 1000001 in binary , So it needs 7 bits

AR = 20

Bits left for opcode = 32 -(2+7+20) = 3

3 0
3 years ago
A workstation’s user prefers KDE over GNOME. Which login manager can this user run to ensure direct login to KDE?
Mice21 [21]

Answer:

B. KDM

Explanation:

The KDE display manager (KDM) was developed for the KDE desktop environment, while the GDM is a display manager for the gnome desktop environment.

The XDM display manager is used by the Linux operating system when a specific desktop environment is not chosen.

3 0
4 years ago
Other questions:
  • g c 24-hour time (also known in the U.S. as military time) is widely used around the world. Time is expressed as hours since mid
    7·1 answer
  • You share a number of files from your computer, and you've received a number of calls from users who say they can't connect to t
    5·1 answer
  • Create a network for a company that sells shoes. Describe the hardware needed and the size of the network (PAN, LAN, WAN) and ma
    6·1 answer
  • Which note taking strategy has you divide a page into 3 sections for your notes, key points, and summary?
    11·1 answer
  • Ano ang dalawang paraan sa paggawa ng abono?​
    6·1 answer
  • Dates of birth were entered into a computer program . The data was stored in the format DAY/MONTH/YEAR.The program rejected this
    12·1 answer
  • Why is computer called and information processing machine​
    6·1 answer
  • It is a type of web page that allows you to share your ideas experiences and beliefs
    9·1 answer
  • Discuss why it is important to know the history of social media​
    10·1 answer
  • What is the two’s compliment of -95,-122,-111,-57
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!