1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novosadov [1.4K]
2 years ago
12

Older systems that often contain data of poor quality are called ________ systems.

Computers and Technology
1 answer:
ladessa [460]2 years ago
7 0

Older systems that often contain data of poor quality are called Legacy systems.

<h3>What are Legacy systems?</h3>

A legacy system is known to be a kind of an outdated computing software and it is known to be called an hardware that is said to be old but still in use.

Note that system is one that tends to meets the requirement that it was originally made for, but it is one that do not allow room for growth.

Therefore, based on the above, the Older systems that often contain data of poor quality are called Legacy systems.

Learn more about Legacy systems from

brainly.com/question/27039994

#SPJ1

You might be interested in
True or false that computers that are joined together are able to share hardware and software, but not data
kozerog [31]
False computers are able to share hardware and software but not data
8 0
3 years ago
A file ____ shows the location of a file or folder
UkoKoshka [18]

Answer:

Path

Explanation:

correct answer: Path

(Hope this helps can I pls have brainlist (crown)☺️)

6 0
2 years ago
Databases offer many security features including passwords to provide authentication, access levels to determine who can access
Murljashka [212]

Answer:

True

Explanation:

When using databases in a project, not everyone has the same access level, e.g the database admin may have the highest level of access (access to data on live mode), the software testers have their own level of access (access to data on test mode) and so on.  

7 0
4 years ago
4.15 LAB: Mad Lib - loops Mad Libs are activities that have a person provide various words, which are then used to complete a sh
Sergio039 [100]

Answer:

Following are the program in the Python Programming Language.

#set the infinite while loop

while(True):

 #get string input from the user

 name=input()

 #get integer input from the user

 num=int(input())

 #set the if statement to break the loop

 if(num==0):

   break

 #otherwise, print the following output

 else:

   print("Eating {} {} a day keeps the doctor away.".format(num, name))

<u>Output</u>:

oranges

5

Eating 5 oranges a day keeps the doctor away.

apple

0

Explanation:

<u>Following are the description of the program</u>:

  • Set the loop that iterates at infinite times and inside the loop.
  • Declare two variables which are 'name' that get string type input from the user and 'num' that get integer type input from the user.
  • Set the if conditional statement for break the infinite while loop.
  • Otherwise, it prints the following output.
7 0
3 years ago
A Chief Security Officer (CSO) has asked a technician to devise a solution that can detect unauthorized execution privileges fro
VikaD [51]

A solution which would best meet the CSO's requirements is: B. Sandboxing.

<h3>What is a sandbox?</h3>

A sandbox can be defined as an isolated environment in a computer system or on a network that is designed and developed to mimic end user operating system (OS) and environments, so as to detect unauthorized execution privileges from the operating system (OS).

In cybersecurity, sandboxing is typically used to safely execute suspicious code and data files without causing any harm to the host device or network. Also, sandboxing can work in conjunction with proxies or unified threat management (UTM).

Read more on sandboxing here: brainly.com/question/25883753

8 0
3 years ago
Other questions:
  • which software is used to mimic intricate hand drawings into digital paintings? _____ is used to replicate hand drawings into di
    7·1 answer
  • The __________ cipher is a method of encrypting alphabetic text by using a series of different monoalphabetic ciphers selected b
    5·1 answer
  • You are the network administrator for Slimjim, a peripheral device company. The network uses Linux, and you need information on
    10·1 answer
  • A ________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers con
    9·1 answer
  • Private sharing model on Opportunities. Leadership has asked the Administrator to create a new custom object that will track cus
    7·1 answer
  • What does cmyk stand for?
    5·2 answers
  • What is the purpose of a career portfolio?
    6·1 answer
  • Describe how a cell’s content and format attributes are related.
    13·2 answers
  • Plz answer this....quickkkkk​
    7·2 answers
  • நெறி என்னும் சொல்லின் பொருள்___ *​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!