1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aloiza [94]
3 years ago
11

_________ products/services are more quickly consumed,usually in a single use or a few usage occasions.

Computers and Technology
1 answer:
stiks02 [169]3 years ago
4 0

Answer: Non durable

Explanation:

Non durable products/services are more quickly consumed,usually in a single use or a few usage occasions. Examples of these product include daily eatables which has to be consumed within a few days or it will perish and other services such as medical and etc.

You might be interested in
Question is in photo
Alisiya [41]
Is this java or python pls explain or else i can’t answer
3 0
3 years ago
Technology is defined as human ________________ in action that involves the generation of knowledge and processes to develop sys
Alenkasestr [34]

Answer:

Innovation:

Explanation:

Technology is defined as human innovation in action that involves the generation of knowledge and processes to develop systems that solve problems and extend human capabilities.

To innovate is to make changes in something established, especially by introducing new methods, ideas, or products.

5 0
2 years ago
1. Given two relations R1 and R2, where R1 contains N1 tuples and R2 contains N2 tuples, and N2>N1> 0, give the maximum an
Anna007 [38]

Answer:

Explanation:

A. Max is correct But min will be max(N1,N2) i.e. N2.

B. max=N1, min=0(no common tuples in R1 and R2)

C. max=N1(R1 and R2 are disjoint sets), min=0(all tuples of R1 are present in R2)

D. max=N1*N2, min=N1*N2

6 0
4 years ago
In implementing Security Life Cycle:__________
Dvinal [7]

Answer:

b) one needs to follow through all phases, assessment, design, deploy and manage security

Explanation:

The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form

At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step

Therefore according to the given options, the second option is correct

7 0
3 years ago
Which securities protects networks from intruders? *
timama [110]

Answer:

I think it is network security

Explanation:

Heard in an ad before :T

5 0
3 years ago
Other questions:
  • When creating a software package, the software must be designed, the code must be written, and then the code must be tested. Thi
    6·1 answer
  • Define scanning and why it’s considered one of the most important phases of intelligence gathering for an attacker. Also discuss
    10·1 answer
  • Tanya wants to create an sql query to fetch records from a table. which is the first word she has to type to write the query?
    7·1 answer
  • A technician is using a network-attached desktop computer with a Type 2 hypervisor to run two VMs. One of the VMs is infected wi
    14·1 answer
  • Which WAN technology is designed to work with a variety of commonly used layer-2 protocols and is sometimes called a layer-2.5 t
    15·1 answer
  • Clunker Motors Inc. is recalling all vehicles in its Extravagant line from model years 1999-2002 as well all vehicles in its Guz
    9·1 answer
  • CSc 2720 - Data Structures: Assignment 1 [100 points] How to Submit: Turn the .java file in Folder Assignment 1 in iCollege no l
    11·1 answer
  • Why do we use if statements?
    9·1 answer
  • How are the functions different and how do i determine the answer
    5·1 answer
  • Advantages of email over traditional mail​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!