1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
6

Rafi is developing an application to send urgent information about global health crises over the Internet to hospitals. He is wo

rried about packets getting lost along the way and the effect that will have on the accuracy of the information. What is his best option for dealing with lost packets
Computers and Technology
1 answer:
Liono4ka [1.6K]3 years ago
6 0
Have the packets virtual
You might be interested in
Var1 = 1<br> var2 = 2<br> var3 = "3"<br> print(var1 + var2 + var3)
Savatey [412]

Explanation:

omg it's Python, I don't like it

I would say the answer is 33 or 6

5 0
3 years ago
The___ allows you quickly access features such as formatting, charting, tables, and totals
cricket20 [7]

Answer:

Quick Analysis toolbar

Explanation:

it appears with the options formatting, chart, total, table, sparklines

7 0
3 years ago
What is 14.10 to the tenth power​
nataly862011 [7]

what i remeber is that when your trying to figure out to the tenth power u have to multiply it like for example:3^{2}power would be 9 because u had to multiply 3, 2 times so i think the answer is 310,592,615,939.35/310,592,615,939.4

3 0
3 years ago
When using color in a computer - generated presentation aids you should use?
Temka [501]
<span>the answer is: the same background color on all visuals and no more than two colors for words.</span>
6 0
3 years ago
Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authen
Ivahew [28]

Answer:

The answer is "Confidentiality".

Explanation:

Data Security is also known as protection against unauthorized computer access, files, and pages through digital information protection. The protection of data also prevents data from bribery.  

  • It applies to both the security of data from unwanted entities being obtained.
  • It allows accessing sensitive data, which may be able to do so.
4 0
3 years ago
Other questions:
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    7·1 answer
  • The "instance" relationship shows that something is an object of a ____.
    5·1 answer
  • How do you change the text style on brainly mobile ?
    12·1 answer
  • How does a linear algorithm perform compared to a quadratic one on our imaginary race track?
    5·1 answer
  • Tweaking existing technology in a new way is usually called _____. leveraged creativity state-of-the-art breakthrough applicatio
    5·1 answer
  • Why should the drives be segregated in a computer?​
    15·1 answer
  • Five examples of technology in community​
    7·2 answers
  • Which model represents any process in general?
    6·1 answer
  • Web résumés allow you to include extra graphics and images that you would not include in a traditional résumé. please select the
    9·1 answer
  • The ________ function will change a character argument from lowercase to uppercase. isupper toupper tolarge fromlower none of th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!