1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AysviL [449]
3 years ago
7

What are two key elements of describing the environment?​ a. ​ Communication protocols and security methods b. ​ External system

s and technology architecture c. Programming language and operating system environment d. ​ Hardware configuration and DBMS’s
Computers and Technology
1 answer:
pashok25 [27]3 years ago
3 0

Answer:

B. External systems and technology architecture.

Explanation:

In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,

Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture

You might be interested in
Identify which of these types of sampling is​ used: random,​ systematic, convenience,​ stratified, or cluster. To determine her
Zarrin [17]

Answer:

B.

Explanation:

Based on the sampling methods provided in regards to the question it can be said that the method being used is called Simple Random. This refers to dividing the population into different group which are then chosen at random, giving each group an equal chance of getting chosen. Which is exactly what is going on in this scenario, as the day is divided into three parts and her mood is measured randomly during each part of the day.

6 0
4 years ago
A programming language that captures only the most primitive operations available to a machine. Anything that a computer can do
Anton [14]

Answer:

A. True.

Explanation:

Programming languages are computer based languages used to pass instructions or task that can be interpreted to machine language, which can be understood by the computer system. Low level programming language and high level programming language are the two categories of program languages.

Low level languages use low level commands. They use processor instruction sets and primitive opcodes for their instruction syntax. Example of a low level language is Assembly language.

High level languages are English based and more complex in its compilation.

8 0
4 years ago
Two employees are unable to access any websites on the internet, but can still access servers on the local network, including th
Reika [66]

Answer:

In the Internet Options, define the name of the proxy server and the port number.

Explanation:

If the two staff  in the company are unable to reach the websites on the internet also  they are  able to access servers on the local area network also the Other staff members don't encounter the problem and they have to face the same problem because they do not define the name of the proxy server and the port number in the internet option.

If they do not define the proxy server and the post they have not accessing the website so to able the accessing it must properly define the proxy server and the port number.

6 0
3 years ago
Radio and television are examples of
Anarel [89]
It's example of feedback because you not interact with them.
3 0
3 years ago
What is a multipurpose operating system
const2013 [10]
Multipurpose OS is an OS that can be use for different purposes
Basically it allow you to play game, watch netflix, surf website, go to brainly, do  your homework etc
4 0
3 years ago
Read 2 more answers
Other questions:
  • Write a SELECT statement that returns two columns: vendor_id and the largest unpaid invoice for each vendor. To do this, you can
    6·1 answer
  • Write a program that calculates and displays a person’s body mass index (BMI). The BMI is often used to determine whether a pers
    11·1 answer
  • When a primary key combines two or more fields, it is called a ____ key?
    5·1 answer
  • A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
    9·1 answer
  • Which of the file names below follows standard file naming convention?
    12·2 answers
  • To display the entire entry for a calculated field, select the column in the Field row, right-click to display the shortcut menu
    15·1 answer
  • Define a function is_prime that receives an integer argument and returns true if the argument is a prime number and otherwise re
    9·1 answer
  • What is the most popular type or method of guaranteed reservation where booking transactions will be charged automatically?
    7·1 answer
  • What does c++ programming mean?
    7·1 answer
  • What are some of the key system-oriented trends that have fostered is-supported decision making to a new level?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!