1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis23 [38]
2 years ago
13

Your network has been having problems lately when users are participating in video conferences - the video and audio stutters ve

ry badly, to the point that the users in building 143 can't even follow what is being said. When you use OmniPeek to investigate, you discover that the link between buildings 147 and 143 is consistently at 90% usage during that period. What should be your next step
Computers and Technology
1 answer:
patriot [66]2 years ago
6 0

Answer:

add a secondary link between buildings 147 and 143

Explanation:

Since the link is consistently showing 90% usage it means that the line is completely congested and data is being slowed due to large amounts of traffic. The best solution would be to add a secondary link between buildings 147 and 143 and divide the users between both links. That would divide the traffic and ultimately speed up the data transfer through these links drastically as they will no longer be congested.

You might be interested in
The entirety of a packet at one Layer becoming the payload section at another is know as?
MA_775_DIABLO [31]
The answer to the question is: encapsulation
8 0
3 years ago
Read 2 more answers
FREE BRAINLIEST!!!
Nastasia [14]

Answer:

B

Explanation:

4 0
3 years ago
Read 2 more answers
When writing potential test questions, it is very important to use vocabulary words in their correct form. Please select the bes
Ilya [14]
The answer is True.

Hope I helped!
6 0
4 years ago
Read 2 more answers
Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai
BlackZzzverrR [31]

Answer: Source

Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.

The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .

The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.

4 0
3 years ago
Choosing the “Quick Print” button will ____________.
harkovskaia [24]
Choosing the "Quick Print" button will print to the default print (Answer is B). The quick print function is accessible in the Quick Access Tool bar . By clicking the drop down arrow of the quick access tool bar it will let you choose different types of default access including your Quick print.
7 0
3 years ago
Other questions:
  • A typical self-expelling fire extinguisher empties its contents in
    8·1 answer
  • Why is it important to begin development of a software solution with a programming design in place? A programming design summari
    11·2 answers
  • Which practice is the safest way to sit at a desk while typing on the computer?
    12·1 answer
  • 2. Which one of the following is not a feature of technology?
    10·1 answer
  • Who developed the first triage-like system for Napoleon's ar
    15·1 answer
  • What games do you play?<br><br><br> Be sure not to report any answers!
    5·1 answer
  • How to use access?<br> like working in access and bringing tables and stuff
    5·1 answer
  • Explain the characteristics of 1st generation computers​
    15·1 answer
  • if anyone is on a Chromebook, do you ever mean to press backspace, then you accidentally press the power button and think "OH CR
    11·2 answers
  • What is the main coding language for netflix?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!