1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetlana [45]
2 years ago
6

What are the key constructs of a G&T Value Delivery objective?

Computers and Technology
1 answer:
BartSMP [9]2 years ago
4 0

Explanation:

delivering business value

You might be interested in
(TCO G) _____ is when network managers deal with network breakdowns and immediate problems instead of performing tasks according
NeTakaya

Option D

Firefighting is when network managers deal with network breakdowns and immediate problems instead of performing tasks according to a well laid out plan.

<h3><u>Explanation:</u></h3>

Network management is a process of monitoring, operating and controlling the network. Various network managers spend most of their time firefighting- dealing with breakdowns and urgent problems.

If managers do not allocate enough time planning and organizing the network and networking staff, they are intended to be reactive rather than proactive in solving problems. A term that refers to reacting to network problems as they arise rather than relying on planned network management activity

4 0
3 years ago
"Using the printf method, print the values of the integer variables bottles and cans so that the output looks like this: Bottles
Anika [276]

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       

       System.out.println("Enter the number of bottles and cans:");

       int numberOfbottles = in.nextInt();

       int numberOfcans = in.nextInt();

       System.out.printf("Bottles: %8d\n", numberOfbottles);

       System.out.printf("Cans:    %8d\n", numberOfcans);

}

}

Explanation:

Ask user to input the number of bottles and cans using Scanner class

Print the results so that the numbers to the right line up (Since we know that the numbers have at most 8 digits, we can use %8d in printf. Also, be aware that how printf statements are written so that the numbers line up)

6 0
3 years ago
The machine that stores your data and files​
Oxana [17]

Answer:

Any file you create or download saves to the computer's secondary storage. There are two types of storage device used as secondary storage in computers: HDD and SSD.

thenks and mark me barinliestt :))

7 0
3 years ago
The windows 8 start screen has controls, also known as its ____, that allow you to interact with the windows 8 operating system.
Angelina_Jolie [31]
Password has the control over the computer
3 0
3 years ago
Several different tunneling protocols can be used in dial-up situations. Which of the following would best be used as a VPN tunn
melomori [17]

Answer:

The answer is the point - to -point protocol, which allows user to set a secure VPN connection for client and server connectivity.

Explanation:

A virtual private network is a private-public network because of encryption and tunneling to ensure the integrity of the data. VPN requires a tunnel to work and encryption.

In VPNs, there are different protocols can be used, such as point- to - Point Tunneling Protocol (PPTP), IPSec, and L2TP.

Point to Point Protocol is a Microsoft protocol which allows user to set a connection and secure VPN destination. Point to point protocol is designed for client and server connectivity. It developed a connection between two computers. The data link layer that transmits over IP networks is used for point to point tunneling.

Such as option A is not correct because it is distracter and IPSecis primary tunneling protocol. It supports only IP networks. L2TP is not a VPN but extend VPN over the various network.

3 0
4 years ago
Other questions:
  • What is the best use of a line chart?
    7·1 answer
  • How to solve 3(x - 2) = 9x<br><img src="https://tex.z-dn.net/?f=3%28x%20-%202%29%20%3D%209x" id="TexFormula1" title="3(x - 2) =
    14·1 answer
  • If Nancy receives an encrypted message from Matthew, which key does she use to read it? Nancy’s private key Nancy’s public key M
    8·1 answer
  • Which of the file names below follows standard file naming convention?
    12·2 answers
  • A problem associated with old drivers is:
    8·1 answer
  • DO YOU EVER FEEL LIKE A PLASTIC<br> DRIFTING THROUGH THE WIND, WANTING TO START AGAIN
    6·2 answers
  • To format a picture to look like a sketch or a painting you can add a(an)
    13·1 answer
  • The term _____ refers to an organization of components that define and regulate the collection, storage, management and use of d
    12·1 answer
  • Please help!!
    12·2 answers
  • Determine which system you would recommend each of the customers use based on their provided user and system specs.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!