1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Art [367]
3 years ago
6

Which characteristics support an agile mis infrastructure?

Computers and Technology
1 answer:
Paraphin [41]3 years ago
6 0

Answer:

The agile MIS infrastructure includes accessibility, availability, flexibility, performance, portability, reliability, scalability and usability. :)

You might be interested in
Can someone help: how to get binary?
xxTIMURxx [149]

Answer:

Explanation:

SENN KİMSİİİİİİİİN???

8 0
1 year ago
Read 2 more answers
What is the decimal value for the jump control?
Allushta [10]

Answer:

24

Explanation:

11000 is equivalent to 24 because if you look at a flippy do, the base is 2. so going from right-left, 2^0 is 1 for the first 0. second zero would be 2^1 which is 2. then the third zero is 4 (2^2). since they are zero’s, they are turned off, but the 1’s indicate that those bases are turned on. the first one going from right to left would then be 8 (2^3) and the last 1 going from right-left is 16 (2^4). so 16+8=24!

edit: didn’t mean to rate myself 1 star lol

4 0
2 years ago
If the decimal number 4 is represented in binary as 100, then what is the binary representation of the decimal number 5?
Allisa [31]
5 is one bigger than 4, so it is 101

Note: this doesn't always work for every number.

the binary numbers 1-8 would be: 1, 10, 11, 100, 101, 110, 111, 1000

Can you guess 9?: 1001

10?: 1010

Hope this helps, <span>and May the Force Be With You!
-Jabba


</span>
8 0
3 years ago
Which of the following supportability analysis tools relies on scheduled maintenance to spot a failure before it impacts system
Schach [20]

Answer:

Option a is the correct answer for the above question.

Explanation:

RCM is an analysis tool that provides the function for analyzing the features of the physical assets for any organization. This tool is used to analyze the profits and loss problem of the organization so that an organization can earn more in his future.

The above question states that which analysis tool is used to tell about the loss factor of the organization then the answer is RCM which is stated on the option a. hence Option a is the correct answer while the other is not because--

  • Option b states about FMECA which is a tool used when the organization earns loss.
  • Option c states about LORA which is a repair tool.
  • Option d states about TAFT which is used all over the system.
8 0
3 years ago
Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses are contained in
mr Goodwill [35]

Answer:

Layer 2 destination address = 00-00-0c-94-36-ab

Layer 2 source address = 00-00-0c-94-36-bb

Layer 3 destination address = 172.16.20.200

Layer 3 source address = 172.16.10.200

Explanation:

To properly understand the given answer, let us define some terms used in the narrative of the question:

Subnet: The sub network or as popularly called subnet  is a logical division of the internet protocol of a network into many different and smaller network. It is typically used to create partitions or subdivisions of large networks into bits.

PDU: The PDU can be said to be an abbreviation for the word power distribution unit or protocol data unit.  It can also be refereed to as an IT device that possess many output ports or terminals. They are mostly used to distribute or transmit power or data to other operating devices with the telecommunication system.

Now referring back to the question asked and the image attached below, we can see that host a and b send their signal through subnet teachers while host c and d send their signal through subnet students thus,

Layer 2 destination address = 00-00-0c-94-36-ab

Layer 2 source address = 00-00-0c-94-36-bb

Layer 3 destination address = 172.16.20.200

Layer 3 source address = 172.16.10.200 are the correct destination.

4 0
3 years ago
Other questions:
  • wHAT ARE THE 5 LAYERS in the internet protocol stack andwhat are the principal responsibilities of eack of theselayers.?
    12·1 answer
  • Identical objects are placed in Beaker A and in Beaker B. The objects float as shown in the diagrams below. What can you conclud
    9·1 answer
  • The computer output for integer programs in the textbook does not include reduced costs, dual values, or sensitivity ranges beca
    14·1 answer
  • To print the number of elements in the array named ar, you can write :
    10·1 answer
  • ? Question
    6·2 answers
  • Gary has to complete a form before enrolling into an online course. A few of the fields require Gary to respond with either a "Y
    7·2 answers
  • Computer Science uses the power of ______________ to solve problems.
    10·1 answer
  • Class C Airspace inner ring begins at the __________ and extends vertically (by definition) to MSL charted values that generally
    5·1 answer
  • What are the disadvantages of vector images when compared to bitmap images?
    14·1 answer
  • You want to connect to a user desktop to review windows 10 configuration settings when the user is not present. which technology
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!