1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leona [35]
3 years ago
13

6.

Computers and Technology
1 answer:
HACTEHA [7]3 years ago
3 0
Question 6 west Germany  
You might be interested in
Which of the following functions needed to implement the information security program evaluates patches used to close software v
solong [7]

Answer:

a. Systems testing

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the term being defined is called System Testing. Like mentioned in the question, this is a technique used in order to evaluate the complete system the system's compliance against specified requirements, which tests its functionalities from an end-to-end perspective in order to evaluates patches used to close software vulnerabilities and make sure it complies with all policies.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
____________ is the ability to stand up for your own interests and to ask for what you want. A. Discipline B. Arrogance C. Asser
devlian [24]
C. Assertiveness. Assertiveness is defined as confident and forceful behavior, so it is the only one that makes sense.
8 0
3 years ago
Read 2 more answers
When a network mask is applied to any ip address on the network, the result is the ip address' network part followed by zeros?
joja [24]
Yes.








-----------------------------------------------------------------------------------
4 0
4 years ago
In the context of databases, the term data redundancy refers to: a. storing the same information in several records b. repeating
AleksandrR [38]

Answer:

d. all of these are possible examples of data redundancy

Explanation:

Redundancy in database management systems (DBMS) is having the same data in more than one place.

If you look at the options, you will see all of them have situation that repeatation of the data.

a. storing the same information in several records

b. repeating data on multiple reports

c. using foreign keys which duplicate the values of primary keys

5 0
4 years ago
You are provisioning a server with eight-core 3 GHz CMP that can execute a workload with an overall CPI of 2.0 (assuming that L2
n200080 [17]

Answer:

The explanation for the question is given in the Explanation section below.

Explanation:

Throughout the query, we gave that we already have 8 core 3 GHz CMP and therefore it performs workflow in 2.0 CPI.

So,

(8 cores*3 GHz) /2.0 CPI = 12 billion/second guidance, we've turned GHz into seconds, so that's a billion years.

Well into the question considering whether he loses 6.67 L2 per 1 K direction.

So,

12*0.00667 = 80 million mistakes per second level-2. For an 8, so 32B*80 = 2560 MB per sec.

Whether the maximum storage capacity is double that of high as 2560*2 = 5120 MB per sec.

However, that's just throughout the DDR2-67 DIMM range. So, we should infer this, because only one storage source could be enough.

4 0
4 years ago
Other questions:
  • A suspension system that allows one wheel to move up and down with minimal effect on the opposite wheel is called what? A. Stabi
    14·2 answers
  • For a panoramic photograph, you will more than likely want to control the exposure of the photograph yourself rather than lettin
    11·1 answer
  • What is a lease? AA contract outlining the terms of a mortgage. BA contract outlining the terms under which a landlord agrees to
    15·1 answer
  • What type of network is a private network that belongs to an organization that can only be accessed by approved internal users?
    15·1 answer
  • Why is flash memory considered nonvolatile?
    5·1 answer
  • Which term best describe the operating system of a computer?
    12·1 answer
  • A list is sorted by selecting the largest element in the list and swapping it with the last one. This technique is called ______
    7·1 answer
  • 1. Do our shared social experiences lead us to think<br><br> communication is a cure-all?
    13·1 answer
  • Which factors have led to the fast growth in IT​
    13·1 answer
  • Jolly 4 pls link in description
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!