1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Morgarella [4.7K]
3 years ago
6

Which of the following goals is likely to require funding? Check all that apply.

Computers and Technology
2 answers:
raketka [301]3 years ago
8 0

Answer:

1 2 6

Explanation:

marusya05 [52]3 years ago
7 0

Answer:

None cause there are none

Explanation:

You might be interested in
Describe the relative benefits of routing over a broadcast style of communication. Is routed traffic more secure than broadcasti
iren2701 [21]

Routing is process of selecting and establishing the routes that data packets take on their way to a particular destination (specific IP addresses). Broadcasting on the other hand is the simultaneous transmission of the same message to multiple recipients. In contrast to routing, broadcasting lacks the ability to direct packets to a specific address. When it comes to security, routing is not necessarily more secure than broadcasting. Without goof security protocols other users can read messages even if they aren't the recipient of the packet.

8 0
3 years ago
Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
kumpel [21]

Explanation:

hope this help here is the answer

3 0
3 years ago
What name is given to any changes to the original data such as users manually modifying data, programs processing and changing d
nadezda [96]

Modification is the name given to an attack that makes changes into original data such as users manually modifying data, programs processing and changing data, and equipment failures.

In modification attacks, only changes are made to original data without deleting it completely. Modification is basically a type of attack in the context of information security. This type of attack creates annoying situations and discords by altering existing data in data files, inserting new false information in the network and reconfiguring network topologies and system hardware.

Modification attack is mainly mounted against sensitive and historical data. Modification attacks target integrity of the original data with an intent of fabricating it.

You can learn more about ha-cker attack at

brainly.com/question/14366812

#SPJ4

3 0
1 year ago
What is the effect of block size in cache design?
Sedaia [141]

Answer:

When designing a cache, you have to consider this things:

  • Delay.
  • Miss rate.
  • Area.

If the cache has a bigger block size may have a lower delay, but when miss the miss rate will be costly. If an application has high spatial locality a bigger block size will do well, but programs with poor spatial locality will not because a miss rate will be high and seek time will be expensive.

5 0
3 years ago
In the context of an expert system, a _____ works with the knowledge base management system to ensure that the knowledge base is
defon

Answer:

Knowledge Acquisition Facility.

Explanation:

The power and effectiveness of the Expert System  is equal to the quality of the knowledge it contains. The  knowledge has to deal with high complexity and apply the best judgement. collection of expert knowledge is very important and involves the collecting information about a field usually from  an expert. This information is stored in a computer program stored as a knowledge base.

Knowledge is always updating so it also very important to keep it up to date and it is done by Knowledge Acquisition Facility.

3 0
3 years ago
Other questions:
  • Suppose a data broker correctly identifies that your grandmother is addicted to playing online hearts. From its business intelli
    8·1 answer
  • What sugar is used in a DNA molecule​
    7·2 answers
  • Consider the following implementation of a class Square:
    12·1 answer
  • What can act as a buffer against unemployment
    11·1 answer
  • Peace is a fruit of the Spirit that comes from _______ .
    11·1 answer
  • What soft ware can you use to erase all of your data from a hard drive safely
    13·1 answer
  • Which option is referred to by the Reports Due tag?
    7·1 answer
  • 1. select the correct answer from the given options.
    5·1 answer
  • What dog breed is this
    6·1 answer
  • Including the word OR will make a search less specific.<br> O False<br> O True
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!