1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ValentinkaMS [17]
2 years ago
13

evaluating how well various computers will handle an organization's workload by running a representative set of real jobs on the

different machines is called
Computers and Technology
1 answer:
muminat2 years ago
5 0

Answer:

Benchmarking.

Explanation:

You might be interested in
Digital Subscriber Line (DSL) is a way for traditional telephone companies to provide Internet access a way for traditional cabl
zvonat [6]

Answer:

Option A is correct

Digital Subscriber line is a way where telephone companies provide internet access for connection.

It is a communication medium used to transfer digital signals. DSL is one of the most popular broadband internet access.

Explanation:

DSL stands for Digital Subscriber Line. DSL works with high-speed bandwidth that connects from a phone jack to a telephone network. DSL works within frequencies. You can use the DSL while making phone calls.

6 0
3 years ago
Read 2 more answers
Chris accidentally steps on another student’s foot in the hallway. He apologizes, but the other student does not want to hear it
sattari [20]

Answer:

He should talk to a trusted adult and fix the problem.

Explanation:

This problem could become even worse and even more than one person could get in on the act.

7 0
3 years ago
Read 2 more answers
25% of 60 min<br> 20% of 60 min<br> 33%% of 60 min
Alexxx [7]
15
12
19.8 cool cool cool
7 0
2 years ago
Solve<br><img src="https://tex.z-dn.net/?f=%20%5Csqrt%7B3%20%2B%20%20%5Csqrt%7B3x%20%2B%202%7D%20%7D%20%20%3D%202" id="TexFormul
asambeis [7]
Here you go, let me know if it’s not clear.

5 0
3 years ago
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type
malfutka [58]

Answer: Access control

Explanation:

Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.

The right answer is Access control

Hope this helps!!

6 0
3 years ago
Other questions:
  • Which part of color theory deals with how colors on a web page relate to each other?
    11·2 answers
  • Photo editing can transform any image into a great photograph.
    9·1 answer
  • In a natural-language processing (NLP) system, the _____ activity involves using the computer to read large amounts of text and
    5·1 answer
  • What is the output of the code snippet given below? string s = "aeiou"; int i = 0; do { system.out.print(s.substring(i, i + 1));
    12·1 answer
  • 1.the following code example would print the data type of x, what data type would that be?
    12·1 answer
  • Peter took a selfie in his room. He was a wearing a light blue shirt. But he failed to realize that that shirt would clash in co
    12·2 answers
  • Which of the following is NOT a font style? Color Bold Italic Regular
    10·2 answers
  • Question 2: Describe and Discuss the concepts of Higher order functions and currying in a functional programming language such a
    10·1 answer
  • Check your knowledge
    9·1 answer
  • Explain why you would use the soft on/off jumper when working on ATX system
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!