1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
3 years ago
10

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is a

ttending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario
Computers and Technology
1 answer:
LenKa [72]3 years ago
6 0

Answer: I gave 6 you can choose from.

Integrity

Scalability

Quality of Service

Fault of Tolerance

Powerline Networking

Security

You might be interested in
Assuming a user enters 25 as input, what is the output of the following code snippet? int i = 0; Scanner in = new Scanner(System
Dmitry_Shevchenko [17]

Answer:

The correct answer for the given question is 24

Explanation:

In the given  question the value of variable i entered by the user is 25 i.e the value of i is 25 control checks the condition of if block which is false .So control moves to the else block and executed the condition inside the else block means it executed i-- decrements the value of i by 1 means i is 24

Following are the program of java :

import java.util.*;// import package

public class Main // main class

{

// main method

public static void main(String[] args)

{

int i = 0;  // variable declaration

Scanner in = new Scanner(System.in); // creating class of scanner class

System.out.print("Enter a number: ");

i = in.nextInt();  //  user input

if (i > 25)  // check if block

{

i++; // increment the value of i

}

else

{

   i--; // decrement the value of i

}

System.out.println(i);  // display i

}

}

Output:

Enter a number:25

24

8 0
3 years ago
01000111 01110101 01100101 01110011 01110011 00100000 01110111 01101000 01100001 01110100 00111111
Natasha_Volkova [10]

12435 425 2 52 35 Guess what?

8 0
3 years ago
What is used to accurately position objects on the slide using a single horizontal and vertical line that intersects in the cent
mars1129 [50]
I think its the ruler c
7 0
3 years ago
Read 2 more answers
What is required to create a game?
Y_Kistochka [10]

Answer: C. competition

Explanation:

6 0
2 years ago
Why is fluency in information technology becoming increasingly important for many college majors?
never [62]
I think the answer to your question is opt. D
5 0
3 years ago
Read 2 more answers
Other questions:
  • How do I type the integral symbol?
    7·2 answers
  • Question 12 :A user complains that his computer is taking a long time to boot. During the boot process, you observe that the har
    7·1 answer
  • Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more pack
    7·1 answer
  • What are the dimensions (width and height) of the largest image we can make with the pixelation widget?
    8·1 answer
  • Why operating system is important software for a computer give five reasons
    13·1 answer
  • Implement a function with signature barGraph(w, h, data) which creates and returns a cs1graphics.Canvas instance that has width
    9·1 answer
  • Android OS "AFTER" Beta.<br><br> A. Cupcake<br><br> B. Candy<br><br> C. Cookie<br><br> D. Carmel
    12·1 answer
  • Write the program to accept the radius of circle and find its diameter coding
    11·1 answer
  • Explain basic anatomy of computers.
    13·2 answers
  • List at least three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential c
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!