1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
14

This network passes data most of the time, but sometimes for reasons unknown to the junior network engineer in charge of monitor

ing the network, the core router often crashes. What is the characteristic that is violated?
A. Failure
B. Availability
C. Performance
D. Manageability
E. Scalability
Computers and Technology
1 answer:
Kaylis [27]3 years ago
8 0

Answer:

The characteristic that is violated is Availability.

Explanation:

  • The network is passing data at mostly, it means performance is good. Junior network engineer is doing his job well then there is minimum chance of network failure or lack of manageability.
  • The scalability; range of computing capabilties can be managed by the engineer.
  • However, sometimes the core router might get crashed due to unavailability of the network that is not under the control of the engineer.

You might be interested in
Rest or take a break every __ minutes when typing. Please help!
Talja [164]
Maybe like 3-5 I think im right
3 0
3 years ago
Read 2 more answers
Bernard has a visual disability. Which type of assistive technology would he use to access print on the chalkboard or overhead s
dusya [7]

Answer:

a tactile input device

Explanation:

Based on the scenario being described it can be said that the best assistive technology for Bernard would be a tactile input device. Such a device would allow Bernard to physically interact with the print on the chalkboard or overhead screen from the device itself without having to actually get close to the chalkboard or screen. Thus allowing him to view its content from the palm of his hand.

8 0
3 years ago
What's the main idea??
tatyana61 [14]
My computer wont let me download this pdf

7 0
3 years ago
Ranges of IP address that anyone can use for their internal networks are known as ______.
Rama09 [41]
Since no answer choices, have to deduce it is Private Networks
8 0
3 years ago
Read 2 more answers
A router has a valid operating system and a configuration file stored in nvram. the configuration file contains an enable secret
Makovka662 [10]
The answer is user EXEC mode. This is for setting, viewing, and testing system processes. In common, the user EXEC commands let you to link to remote devices, modify terminal line settings on a temporary basis, perform basic tests, and list system information. This also used by common system administrators, while the privileged EXEC mode is used by the root administrator. Use the enable and disable instructions to shift between the two levels. Access to the user-level EXEC command line needs a valid password.
8 0
3 years ago
Other questions:
  • What are 7 key traits for knowing your audience
    6·2 answers
  • Suppose we are comparing the implementations of insertion sort and merge sort on the same machine(You don’t need to know the alg
    13·1 answer
  • Describe the dynamic Network Address Translation (NAT).
    9·1 answer
  • Device driver:<br> System software or application software
    11·2 answers
  • 2.8 Code Practice: Question 2
    11·1 answer
  • Kamal plans to offer new, more favorable contracts to business customers who are now receiving a discount and use wireless servi
    7·1 answer
  • Assume an ArrayList and a Linked List each contain 10,000 items. Which operation is performed fastest
    14·1 answer
  • Which of the following statements should be avoided when developing a mission statement?
    13·1 answer
  • Write about virus in five points.​
    8·1 answer
  • write a program that asks the user for a month number and displays the number of days that month has?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!