1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
3 years ago
10

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is a

ttending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario
Computers and Technology
1 answer:
LenKa [72]3 years ago
6 0

Answer: I gave 6 you can choose from.

Integrity

Scalability

Quality of Service

Fault of Tolerance

Powerline Networking

Security

You might be interested in
How does a MIPS Assembly procedure return to the caller? (you only need to write a single .text instruction).
AnnyKZ [126]

Answer:

A MIPS Assembly procedure return to the caller by having the caller pass an output pointer (to an already-allocated array).

8 0
3 years ago
Operations that run in protected mode must go through which of the following before they can access a computer’s hardware? A. Ke
HACTEHA [7]

Answer:

Option A (Kernal) seems to be the right answer.

Explanation:

  • A Kernel appears to be the central component of such an OS. This handles machine as well as hardware activities, including most importantly storage as well as CPU power.
  • This manages the majority of the initialization as well as program input/output requests, converting them into CPU data-processing commands.

The other given option are not related to the given circumstances. So that option A would be the right answer.

3 0
3 years ago
If I were to delete a file on a school Chromebook on Chrome OS, would teachers have some special way of seeing it?
Maslowich
Am not sure
Hope I helped
3 0
3 years ago
One vulnerability that makes computers susceptible to walmare is:
sammy [17]
C hope it’s right :))) !
6 0
3 years ago
Read 2 more answers
Which of the following can you NOT import contacts from?
mariarad [96]
It will be 4 I believe.
4 0
3 years ago
Read 2 more answers
Other questions:
  • 1 what elements of composition are under your control in photoshop
    13·1 answer
  • Which option allows you to customize the order of your data ?
    8·2 answers
  • What are the three business writing formats
    12·1 answer
  • You’re browsing the internet and realize your browser is not responding. Which of the following will allow you to immediately ex
    11·1 answer
  • Which camera mode gives the photographer the greatest amount of control?
    7·2 answers
  • Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, i
    15·1 answer
  • EASY POINTS what favorate food<br> so easy
    7·2 answers
  • 3. Windows that are viewed as Web pages have<br> sections. **
    9·2 answers
  • I have a top-secret recipe for the greatest cookie dough I have made and I want to keep the recipe a secret so I apply for a? *
    15·1 answer
  • Which of the following is not a reason to choose a community college?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!