1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
15

In terms of system thinking, what is process?

Computers and Technology
2 answers:
Talja [164]3 years ago
5 0

Answer:b) The computer program that processes the data.

Explanation: In the computer system , process is the part of computer program which are responsible for performing of the processing of the data and other functions .The working of the process is associated with the program code and related activities/functions.

Other options that are mentioned in the question are incorrect because they don't describe the process correctly .Thus , the correct answer is option (b).

trasher [3.6K]3 years ago
4 0

Answer:

The correct answer is B. In terms of system thinking, process is the computer program that processes the data.

Explanation:

In computer science, the process is a program running on a computer. Each process usually has its own memory space and other resources that other processes cannot access. Most operating systems maintain this information in the process table. Various processes can communicate with each other in a number of ways.

Modern operating systems can handle multi-run, that is, several program processes at the same time. It also happens that a program consists of several simultaneous processes, which are either run on multiple computers in a distributed system, or on the same machine through multi-run.

You might be interested in
You are planning to depart on a flight from area 2 to area 4 in 12 hours. What weather is forecast to occur along your route?
Andre45 [30]
It depends on where you live!
5 0
2 years ago
I need the answer to life. I cant live without my POGCHAMPS!
Ilya [14]

Answer:

Pray to God and ask him for help in life. May God bless you

Explanation:

8 0
3 years ago
Read 2 more answers
An independent penetration testing company is invited to test a company's legacy banking application developed for Android phone
LenaWriter [7]

In the case above, the company can prevent this from happening in the public Internet through the Use certificate pinning.

<h3>Should a person use certificate pinning?</h3>

Mobile applications are known to be one that often make use of   certificate or also public key pinning so that they can be able to make sure that communications are secure.

Hence it is one that  is often implemented if  the developer of the application is said to be require to validate the remote host's identity or if operating in a harsh environment.

Hence, Certificate pinning hinders which certificates are considered valid for a any kind of website,  and as such, In the case above, the company can prevent this from happening in the public Internet through the Use certificate pinning.

Learn more about certificate from

brainly.com/question/1874937

#SPJ1

4 0
1 year ago
A .jpg file is an example of which of the following file types
egoroff_w [7]
A .jpg file is going to be a picture. =)
5 0
3 years ago
Read 2 more answers
Explain what a hypervisor application is and what it is used for. Pick a hypervisor application and list its requirements
Masja [62]

Answer:

can u give me more details so that I can help u

8 0
3 years ago
Other questions:
  • 2. Now write a program named filereader.py that reads and displays the data in friends.txt. This program should also determine a
    5·1 answer
  • A _____ is a member function that is automatically called when a class object is created.
    13·1 answer
  • What occurs when you call a method on a reference variable that contains null? Select one: a. An ArrayIndexOutOfBoundsException
    11·1 answer
  • A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the netwo
    10·1 answer
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • In C++ write a program that prints out PI as a type double and a type float EXACTLY as shown below. Your program should have ONE
    13·1 answer
  • What is copy and paste?
    13·2 answers
  • identify at least three additional ethical responsibilities expected from a computer professional. In brief, explain each respon
    11·1 answer
  • Buying a home security system is an example of protecting your home against________.
    5·1 answer
  • Public class Billing {
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!