1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FromTheMoon [43]
3 years ago
15

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-p

riority data from high-priority data.
Computers and Technology
1 answer:
PtichkaEL [24]3 years ago
7 0
The answer is: Deep-Packet inspection
You might be interested in
Sptr is a pointer pointing to the beginning of an array called sarray. To access the value in sarray[3] by using the pointer, yo
kupik [55]

Answer:

The correct option for accessing the value in sarray[3] is : d) *(sptr+3)

Explanation:

a) *sptr[*3]  is wrong option because its syntax is not right it will give errors.

b) *sptr+3 is also wrong option because it will add 3 to the value of sarray[0].

c) sptr+3 is wrong option because it will only access the address of sarray[3] not the value it contains.

d) *(sptr +3) is correct syntax for accessing value in sarray[3] by using pointer

4 0
3 years ago
Identify the components of the enveloped virus budding process
Elina [12.6K]

The components of the enveloped virus budding process are:

  • lipid bilayers
  • fission event
  • Glycosylated (trans-) membrane proteins.

<h3>What is the case of the virus about?</h3>

Virus budding in general is known to be a term that connote the scattering or disturbance of a cellular membrane and it is one away from the cytoplasm.

Note that it is said to be the envelopment of the viral capsid and this is done by one or more lipid bilayers that can be seen in the viral membrane glycoproteins, and it is one where a fission event takes place.

Hence The components of the enveloped virus budding process are:

  • lipid bilayers
  • fission event
  • Glycosylated (trans-) membrane proteins.

Learn more about virus from

brainly.com/question/26128220

#SPJ1

3 0
2 years ago
If a firm puts Internet-facing servers directly in the Internet, they are exposed to threats of attack from anywhere in the worl
djverab [1.8K]

Answer:

True.

Explanation:

If a firm puts servers that are internet facing directly on the internet then the servers are exposed to external attacks and these attacks can be from anywhere in the world.

The server becomes vulnerable or unsafe and attackers can attack and can manipulate or tamper the server code from anywhere in the world.

8 0
3 years ago
Jack and Diane are creating each ClassID following this pattern: first two letters of ClassName (one uppercase, one lowercase),
Norma-Jean [14]

Answer:

i dont know 123 IdK

Explanation:

6 0
3 years ago
Giving reasons for your answer based on the type of system being developed, suggest the most appropriate generic software proces
soldi70 [24.7K]

Answer:

For the university accounting system that replaces an existing system the appropriate generic software process model is Waterfall model

This is because the requirement of the system can be predicted in advance because of the existing system and secondly, this a mission critical system and the requirement are stable and reusable

For the  interactive travel planning system that helps users plan journeys with the lowest environmental impact the appropriate generic software process model is Prototype Model

This is because the user's requirement may likely change and fast delivery is essential to be implemented and for this the prototype model can save time of development to focus on essential functions first.

Explanation:

In order to get a better understanding of the answers above let define the concept of

Waterfall Model:

   We can define waterfall model as a type of software development approach that explains step by step development method, this software development approach consist of five to seven steps and each step is characterized by different tasks and objectives and these steps combined together explains the the life cycle of the the software development process.

Prototype Model

   We can define prototype model as a type of system development approach whereby an estimation(i.e the prototype) of the final system is constructed,tested and adjusted until the desired result is obtained and the the main system is then constructed with the specification of the perfect estimation or prototype for example when constructing a bridge the engineer apply this methodology by first constructing an estimation or prototype of what the bridge should look like and then various test and adjustments are  been carried out on this prototype bridge afterward he main bridge is been constructed with the specification of the prototype.  

8 0
3 years ago
Other questions:
  • Write a function analyze_text that receives a string as input. Your function should count the number of alphabetic characters (a
    5·1 answer
  • What is the role of programmers in an organization?
    6·1 answer
  • What are two examples of ways an electronic record may be distributed to others?
    15·1 answer
  • Match each vocabulary word to its definition.
    11·2 answers
  • In the Advent of computer technologies and it's applications, to what extent these technologies have influenced the world.
    11·1 answer
  • What is the difference between player-centric game design and designer-centric game design? How does a player-centric game assis
    7·1 answer
  • What happens in Word 2016 when the Home ribbon tab is clicked on?
    9·1 answer
  • What types of information should have their sources cited to avoid plagiarism? List at least 3
    10·1 answer
  • What's exactly the difference between "Library" and "Framework" ? ​
    7·1 answer
  • The ____________ command / function is used in Python graphics and text-based programming code.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!