1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sindrei [870]
3 years ago
9

What is performance? Multiple Choice measures how quickly a system performs a process or transaction a system that is not operat

ing and cannot be used refers to the ability of an application to operate on different devices or software platforms, such as different operating systems the degree to which a system is easy to learn and efficient and satisfying to use
Computers and Technology
2 answers:
Lilit [14]3 years ago
8 0

Answer: measures how quickly a system performs a process or transaction

Explanation:

Computer performance refers to how well a given computer system performs, which is estimated by its accuracy, efficiency and speed when completing a process or transaction.

A computer performance evaluation will assess a system's resources and outputs to make sure that it´s performing in the best possible way.

Some parameters of performance are latency, speed, throughput, and bandwidth.

mrs_skeptik [129]3 years ago
5 0

Answer: A. Measures how quickly a system performs a process or transaction.

Explanation:

Computer Performance describes the degree of work a computer can do and how fast it can accomplish that work. Major factors accounted for in determining Computer Performance include but are not limited to;

1. Response time

2. Bandwith

3. Throughput

Response time accounts for the amount of time it takes for the computer to execute an instruction.

Bandwidth is the rate at which data moves from one point to another in a channel.

Throughput is the rate at which information is processed.

Overall, Computer Performance is a measure of speed.

You might be interested in
You are late in the preparation of the computer graphics for your final report and presentation. You run into a friend who is gr
icang [17]

Answer:

Tactic Exchange

Explanation:

The approaching style of the student to his/her friend for help is of an influence categorized as the "Exchange Influence Tactic".

The Exchange Influence Tactic refers to when a person persuades someone or seeks influence over him/her by offering some sort of reward for their help rendered. It might also work by reminding other person of any favor which you offered in the past that should be repaid now.

Here the student is seeking help of his/her friend for completion of a final report for which he/she is already late. In exchange the student is assuring his/her friend the completion of certain spreadsheets which are pending on him/her. Hence, the student has used the exchange tactic to get his work done by offering a favor in response.

3 0
3 years ago
Image-editing software is used to_____
inn [45]

Edit images.

(have to spam so i ahve enough words)

apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple

7 0
3 years ago
Explain how inflation flattens the universe
DIA [1.3K]
They rise to the surface of the earth
8 0
3 years ago
Read 2 more answers
Styles are modified by using the Office clipboard in the Home tab. true or false
cluponka [151]
Your answer is false
7 0
3 years ago
Read 2 more answers
Discovery of a vulnerability in a software program can potentially be sold to the government. Group of answer choices True False
enyata [817]

Discovery of any vulnerability in a software program can potentially be sold to the government: True.

<h3>What is vulnerability?</h3>

Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.

This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.

Read more on vulnerability here: brainly.com/question/25813524

#SPJ1

4 0
2 years ago
Other questions:
  • In Paint, which of the following are ways to use a picture that you have saved on your computer? (Select all that apply.)
    8·1 answer
  • 3. What term refers to the physical locations of elements in relation to each other?
    10·2 answers
  • Can you use public domain images without violating copyright laws?
    5·1 answer
  • How many characters does the "short text" have?
    9·1 answer
  • What is motivation and state the two forms​
    14·1 answer
  • Check My Work Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What
    9·1 answer
  • Which of the following is used to move to end of the row?​
    8·1 answer
  • What would happen if computers only had input devices?
    9·1 answer
  • I need help <br> with a question<br> what can i write for ex when he mad
    13·2 answers
  • What can handle work that is hard on a person and could cause repetitive injuries?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!