1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
2 years ago
10

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is a

ttending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario
Computers and Technology
1 answer:
LenKa [72]2 years ago
6 0

Answer: I gave 6 you can choose from.

Integrity

Scalability

Quality of Service

Fault of Tolerance

Powerline Networking

Security

You might be interested in
What is the name used for the integrated program development environment that comes with a Python installation?
r-ruslan [8.4K]

Answer:

IDLE

Explanation:

IDLE is the standard Python development environment. Its name is an acronym of "Integrated DeveLopment Environment". It works well on both Unix and Windows platforms.

It has a Python shell window, which gives you access to the Python interactive mode. It also has a file editor that lets you create and edit existing Python source files. IDLE is intended to be a simple IDE and suitable for beginners, especially in an educational environment. To that end, it is cross-platform, and avoids feature clutter.

8 0
2 years ago
Which term refers to the use of the internet at work for personal use?.
strojnjashka [21]

Which term refers to the use of the Internet at work for personal use? cyberloafing.Cyberloafing is a term used to describe the actions of employees who use their Internet access at work for personal use while pretending to do legitimate work.

4 0
1 year ago
Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co
pentagon [3]

Answer:

application software?

Explanation:

7 0
3 years ago
I'm trying to network two laptops together using ethernet cable but it isn't working. Why isn't it working
Nonamiya [84]

On modern network cards, this should just work.

It is advisable to give each laptop its own fixed IP address, such as 192.168.1.1 and 192.168.1.2 (with a netmask of 255.255.255.0)

However, you need to define what you expect to work. The first thing to try is ping <em>the other</em> machine from the command prompt, e.g.:

C:\> ping 192.168.1.2

Then, you can try to access shared network drives if you have enabled that. In the file explorer, try typing: \\192.168.1.2

5 0
3 years ago
A medium is a:
Nostrana [21]
C is a medium. And the answer
4 0
3 years ago
Read 2 more answers
Other questions:
  • What is a benefit of peer-to-peer networking?
    14·2 answers
  • Drag the tiles to the correct boxes to complete the pairs.
    7·2 answers
  • Sam wanted to open a file that he saved yesterday. Which component inside the computer stores this file? the hard drive the fax
    13·2 answers
  • The _____ is the area in Microsoft Excel where you can perform file commands such as Save, Open, and Print
    15·1 answer
  • You are out on the water. you do not understand what another boater intends to do. what sound signal should you make?
    14·1 answer
  • Search the internet for news of a motor vehicle collision in your community involving drugs or alcohol. Keeping in mind that you
    8·1 answer
  • What are some of the issues that organizations need to be aware of when designing and managing data?
    8·1 answer
  • Um can anyone who is really into science and physics answer this question
    7·1 answer
  • Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or
    8·2 answers
  • Given the following statement, what is the value of myExample?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!