1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepan [7]
3 years ago
6

There are two activities on your schedule, which are: 1) install server in lab 2) move server into the data center. however, the

second task can't start until the server has run in the lab for 5 days without failure. this is an example of what?
Computers and Technology
1 answer:
astra-53 [7]3 years ago
4 0
Quality Assurance or testing.
You might be interested in
What is the difference between above ground mining and underground mining?
neonofarm [45]
If this is in reference to diamond mining then above ground would be panning while below ground would be the actual mining into the soil. 
6 0
3 years ago
How does segmenting your network increase network security?
lys-0071 [83]

Answer:

By segmenting networks, it becomes easier to protect the most sensitive data that you have on your internally-facing network assets. The creation of a layer of separation between servers containing sensitive data and everything outside of your network can do wonders to reduce your risk of data loss or theft.

Explanation:

PLEASE MARK ME AS BRAINLIEST

5 0
3 years ago
Which JavaScript defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B?
suter [353]

Java script same origin defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B.

<h3>Defenses and Browser Vulnerabilities</h3>

Java script sandboxing defense JavaScript to run in a restricted environment ("sandbox") and limit the computer resources it can access or actions it can take.

Java script same origin defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B.

Java script limit capabilities restrict JavaScript to not support certain capabilities.

Find out more on browser vulnerability at: brainly.com/question/18088367

5 0
2 years ago
in speech writing, it can be defined as all aspect of your writing that help the reader move smoothly from one sentence to the n
serious [3.7K]

Answer:

Logical flow

Explanation:

In speech writing, LOGICAL FLOW can be defined as all aspects of your writing that helps the reader move smoothly from one sentence to the next, and from one paragraph to another.

With the Logical flow, one will be able to guide his thoughts coherently and sequentially in which Readers can fully absorb and easily understand the message.

5 0
3 years ago
An IT systems engineer creates a new Domain Name System (DNS) zone that contains a pointer (PTR) resource records. Which zone ty
irina1246 [14]

Answer: Reverse DNS zone

Explo: a reverse DNS zone needs a PTR record since it is in charge of resolving the IP address to a domain or a hostname.

5 0
3 years ago
Other questions:
  • When an instance of a class, or object, is specified as a parameter to a method, a reference to the said object is passed to the
    15·1 answer
  • Of the following choices, what indicates the primary purpose of an intrusion detection system (IDS)?
    12·1 answer
  • Which term refers to actions that you would typically perform on a computer to revive it even if it functions in an unexpected m
    15·1 answer
  • A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LA
    8·1 answer
  • An important principle in information security is the concept of layers of security, which is often referred to as layered secur
    10·1 answer
  • Which of the following “invisible” marks represents an inserted tab?
    11·2 answers
  • What Is the Purpose of a Web Browser? *<br><br>​
    7·2 answers
  • 1. What are the advantages and disadvantages of technology in communication?
    9·2 answers
  • Design an Application called Student Course Management create interface called Student Course add an abstract method called ad C
    10·1 answer
  • identify the difficulties with the k-nearest neighbor algorithm. a. both a and b b. calculate the distance of the test case from
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!