1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sindrei [870]
3 years ago
9

What is performance? Multiple Choice measures how quickly a system performs a process or transaction a system that is not operat

ing and cannot be used refers to the ability of an application to operate on different devices or software platforms, such as different operating systems the degree to which a system is easy to learn and efficient and satisfying to use
Computers and Technology
2 answers:
Lilit [14]3 years ago
8 0

Answer: measures how quickly a system performs a process or transaction

Explanation:

Computer performance refers to how well a given computer system performs, which is estimated by its accuracy, efficiency and speed when completing a process or transaction.

A computer performance evaluation will assess a system's resources and outputs to make sure that it´s performing in the best possible way.

Some parameters of performance are latency, speed, throughput, and bandwidth.

mrs_skeptik [129]3 years ago
5 0

Answer: A. Measures how quickly a system performs a process or transaction.

Explanation:

Computer Performance describes the degree of work a computer can do and how fast it can accomplish that work. Major factors accounted for in determining Computer Performance include but are not limited to;

1. Response time

2. Bandwith

3. Throughput

Response time accounts for the amount of time it takes for the computer to execute an instruction.

Bandwidth is the rate at which data moves from one point to another in a channel.

Throughput is the rate at which information is processed.

Overall, Computer Performance is a measure of speed.

You might be interested in
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
3 years ago
What are hard ware and software requirments in multimedia computer system
marishachu [46]

Answer:

Some hardware requirement: Monitor, keyboard, mouse, sound card, memory, processor, graphics display card. Some software requirement: Windows XP/Vista, Video for Windows, Quicktime.

Explanation:

BRAINLEST

4 0
3 years ago
Cite los botones de edición que existen y determine en que ficha y grupo se encuentran.
Alina [70]

Answer:

GHRUDIFDSFHEOUSDHFHESDHFHEFE

Explanation:

SORRY I DONT KNOW

5 0
3 years ago
According to the mil-std-6016 what are the requirements for information to be passed between and among joint forces and organiza
mixas84 [53]

Based on  mil-std-6016, the requirements for information to be passed between and among joint forces, along with the technical interfaces is called Joint Tactical Operations (JTO) Procedural Handbook.

<h3>What is Joint Tactical Operations (JTO) Procedural Handbook?</h3>

This is known to be a book that contains all  the provisions that is needed by system operators along with some technical parameters and tactical procedures.

It is often used  for the exchange of near real-time data through TDL and it is known to be set up to function on console in the time of joint service operations and exercises.

Learn more about military from

brainly.com/question/525279

6 0
1 year ago
Which pdu is processed when a host computer is de-encapsulating a message at the transport layer of the tcp/ip model?.
yulyashka [42]

The PDU that is processed when a host computer is de-encapsulating a message at the transport layer of the tcp/ip model is segment.

<h3>What is this PDU about?</h3>

Note that in the transport layer, a host computer is said to often de-encapsulate  what we call a segment so that they can be able to put back data to an acceptable or given format through the use of the application layer protocol that belongs to the TCP/IP model.

Therefore, The PDU that is processed when a host computer is de-encapsulating a message at the transport layer of the tcp/ip model is segment as it is the right thing to do.

Learn more about host computer from

brainly.com/question/553980

5 0
2 years ago
Other questions:
  • The range A2:B4 has how many cells?<br><br> Answers:<br> 2,4,6,8
    10·2 answers
  • What is the equivalent of film speed in digital cameras?
    6·2 answers
  • What is the amount of a good or service that business have available to sell?
    13·1 answer
  • Using a wireless network without the network owner's permission is known as ________.
    15·1 answer
  • Which type of computing device is best suited to having a digital pen as an input device?
    9·1 answer
  • What did do you do if you made a mistake on a computer?
    14·2 answers
  • Write a void method named myMethod which prints "This is a void method" (without the quotes). Your method should be declared pub
    5·1 answer
  • You were just hired as an IT Specialist for Smalltown School District. Your first assignment is to review a problem area&amp; in
    11·1 answer
  • Select the correct answer from each drop-down menu.
    5·2 answers
  • Who is the best valorant character
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!