1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sukhopar [10]
3 years ago
9

ANSWER ME PLS

Computers and Technology
1 answer:
jekas [21]3 years ago
6 0
Computer is the answer
You might be interested in
Consider a three sequentially stepped process named as Process A, Process B and Process C. Input comes into Process A. Output fo
Novay_Z [31]

Answer: The process B is at the maximum steady state. A process is said to be at steady state if the variables that define the behavior of the system are unchanging

Explanation: From the Above

Process A takes 2 minutes per unit and hence can process (60/2) = 30 units per hour. Process B can process only (60/3) = 20 units per hour. Process C can handle (60/1) = 60 units per hour. the steady state output from this system is the smallest of the three, that is process B 20 units per hour

4 0
4 years ago
An administrator has been working within an organization for over 10 years. He has moved between different IT divisions within t
rodikova [14]

Answer:

User roles and access authorization

(Explanation of this question is given below in the explanation section.

Explanation:

As noted in question that a terminated employee comeback in office and installed some malicious script on a computer that was scheduled to run a logic bomb on the first day of the following month. And, that script will change administrator passwords, delete files, and shut down over 100 servers in the data center.

The following problem can be with that account

  • Unauthorized user access and privileges

The user may be given unauthorized access to system resources. If a user has unauthorized access to system resource then he can modify or destroy the system function easily.

  • The firewall may be disabled to detect the malicious script

The firewall should be enabled to detect such types of attack from unauthorized access to the system

  • Role

May be user role is not defined properly. If role would be defined according to user role then there are very fewer chances in doing unauthorized changes in the system that will result in an unexpected outage.

5 0
4 years ago
Which one of the following UNIX utilities is purpose-built to quickly return the location (filepath) of files by querying a data
Galina-37 [17]

Answer:

a.locate

Explanation:

locate utility in Unix is used to quickly return the filepath of the file searched for.find also used to do the same work but it is not as fast as locate.

locate is faster than find because it does not read the filesystem to search the file infact it refers to the database to search the file and produces it's output and the database is created by updatedb command.

4 0
3 years ago
Shift Registers. What is a Bit Shift Register? What are the different types of Bit Shift Registers and what might be their appli
lesya [120]

Answer:

Digital logic circuits made of cascaded flip flops.

The different types of Bit Shift Registers are; Serial-In Serial-Out, Parallel-In Parallel-Out, Serial-In Parallel-Out, Parallel-In Serial-Out.

Shift registers can be used as converters to translate data, as delay circuits or counters.

Explanation:

Shift Registers are digital logic circuits made of cascaded flip flops. Their main function is to shift their contents (bits) to the right or to the left one bit at a time. Bit Shift Registers can process data either parallelly or serially. So the different types of Bit Shift Registers are;

  • Serial-In Serial-Out
  • Parallel-In Parallel-Out
  • Serial-In Parallel-Out
  • Parallel-In Serial-Out

Because of their ability to convert data from parallel to serial, shift registers can be used as converters to translate data. Some of their other applications are also delay circuits or counters, storing and manipulating data etc.

I hope this answer helps.

8 0
3 years ago
Preparing for jobs that are high in demand allow you to...
quester [9]

Preparing for jobs that are high in demand allows an individual to focus their development of human capital on those careers.

Focus your development of human capital on those careers

<u>Explanation:</u>

As the demand for the job is high, there is no denying the fact that it will increase the likelihood of getting a job. It is a simple proportion, more the number of jobs, more are the chances of getting them.

Last but not least it will also allow an individual to be more attractive to employers in those fields. As an individual prepares for the job, they will acquire certain skills and knowledge that are capable of letting them being perceived as attractive.

7 0
3 years ago
Other questions:
  • What would be the desired output of a home security system?
    6·1 answer
  • The speed of a cpu is expressed in cycles called ________.
    14·1 answer
  • List 5 major steps to make a bank deposit
    6·1 answer
  • Which is a group of related software applications that are bundled and sold together?
    9·2 answers
  • How do you check how much space is left in current drive?
    9·1 answer
  • Under which menu option of a word processing program does a callout appear?
    7·2 answers
  • Talia was a scientist whose research compared the birth rates of young
    12·2 answers
  • In order for storage devices to be prepared for use, they must be ____________ Group of answer choices pre-prepared loaded initi
    11·2 answers
  • What pets are on Terraria and how can you get them?
    15·2 answers
  • When a derived class method has the same name as a base class method, it is often said that the derived class method ________ th
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!