1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
2 years ago
10

PLZ ANWER FAST!!!!

Computers and Technology
1 answer:
rjkz [21]2 years ago
8 0

It should be noted that the speed of fast data on a particular network is known as <u>bandwidth.</u>

The ability of a network to recover after any type of failure is known as <u>fault tolerance.</u>

Text within a document that is linked to other information available to the reader is called<u> hypertext.</u>

The way the network is laid out, including all the interconnections is known as <u>network topology.</u>

When all computers in a network are connected in a “star” formation, it's known as a <u>star topology.</u>

A type of network that does not use a router but shares data directly between computers is known as peer-to-peer.

A unique location for a computer on the network is known as the <u>IP address.</u>

Rules for how routers communicate with one another and send data are known as the<u> router protocols.</u>

Learn more about bandwidths on:

brainly.com/question/8154174

You might be interested in
What is a common method for testing a spot weld?
Gennadij [26K]
Hey there,
The common method is destructive testing.

Hope this helps :))

<em>~Top♥</em>
4 0
3 years ago
Why do electronic devices gather so much dust? Thanks
Fudgin [204]
Any electrical device that produces any type of air kind of gets collected as the air flows in or out
3 0
3 years ago
Consider an individual who wishes to ensure that their information remains secure and confidential, possibly to secure their per
EleoNora [17]

In terms of leaving evidence on the system,  their key concerns is their data protection and someone hacking into the system or reading their browsing history to use it against them.

<h3>What is system hack?</h3>

System hacking is a term that connote when a person or a computer user has a compromise between computer systems and software that tends to access the target computer and steal their information or others.

In terms of leaving evidence on the system,  their key concerns is their data protection and someone hacking into the system or reading their browsing history to use it against them as well as their privacy been exposed.

Learn more about system hack from

brainly.com/question/13068599

#SPJ1

7 0
2 years ago
Assume there is a variable , h already associated with a positive integer value. Write the code necessary to count the number of
Nataly_w [17]

Answer:

pseudo code:

x=1

q=0

while x*x<h: {

x += 1}

q=x-1

complete code in C language

#include <stdio.h>

int main() {    

   int h=19;

  int q=0;

   int x=1;

  while ((x*x)<h){

 x += 1;

   }

   q=(x-1);

   printf("The sum of total perfect squares less than %d is: %d", h,q);

   

   return 0;

}

Explanation:

first '%d' in print statement refers to h and second '%d' in print statement refers to q

4 0
4 years ago
Susan teaches many individuals and business professionals how, why, and the benefits and challenges to using social media. Of th
Simora [160]

Answer:

The answer is B: Ensuring consumer protection

Explanation:

Although social media is a great tool for businesses to communicate with its consumers and also for acquiring new consumers. However, there is a growing number of business that are now delving into social media for the purpose of selling its goods and services. While it is important for Susan to teach many individuals and businesses of the need to use social media for their business, it must be stated that trust in online platforms is high essential if engaging in social commerce is to be successful. Currently, there is evidence that fraudsters use these social media sites to get valuable information and thus this challenge must be considered by organizations before engaging in social media.

6 0
4 years ago
Other questions:
  • Develop an EER model for the following situation using the traditional EER notation, the Visio notation, or the subtypes inside
    8·1 answer
  • Platon says, when taking a photo you should:<br> (Photography class)
    5·1 answer
  • Twitter and facebook are both examples of the​ _____________ internet business model.
    7·1 answer
  • What is the result when you run the following program?<br> print("2 + 7')<br> print(3 + 1)
    6·2 answers
  • Describe a hybird electrical vehical
    12·1 answer
  • Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the
    8·1 answer
  • Q.2 (A)
    5·1 answer
  • How do we store value in a variable? Give an example
    15·1 answer
  • Read the following statements and select the
    5·2 answers
  • PLEASE HELP<br><br><br> Write a pseudo code for an algorithm to wrap a gift.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!