1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna11 [192]
3 years ago
15

Fluyen en tecnologia

Computers and Technology
1 answer:
bonufazy [111]3 years ago
4 0
Demand flow technology<span> (DFT) is a strategy for defining and deploying business processes in a </span>flow<span>, driven in response to customer demand. DFT is based on a set of applied mathematical tools that are used to connect processes in a </span>flow<span> and link it to daily changes in demand.</span>
You might be interested in
Which version of windows server 2008 must computer be running to create a failover cluster?
Mrrafil [7]
Windows 7 had this problem
6 0
3 years ago
In which situations would a text-to-speech tool be useful? Check all that apply. O A reader needs to hear a word pronounced. A s
spin [16.1K]

Answer:

The answer to this question is given below in the explanation section

Explanation:

The correct answer is :

A reader needs to hear a word pronounced

A student needs to take notes about a text

Because, text to speech tools mostly used to hear the text written in some files such as reading text from pdf file etc, or word pronunciation. However other options are not right because, reading a difficult material does not make sense with reading it links to understanding.

However, speech to text can be used by the student to take notes while listening the text, but would be easy instead of taking notes and listening, it is easy to copy the text.

7 0
3 years ago
Read 2 more answers
In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers'
myrzilka [38]

Answer: True

Explanation: Domain name system(DNS) is the kind of attack that exploits the functioning of the DNS .This process is also known as the DNS spoofing .The corrupted data is invoked in the cache database and thus creates spoof.

It creates diversion of the traffic from the actual servers to the fake servers and entering the exploited data in the cache database.Thus, the given statement is true.

4 0
2 years ago
Code in Python
KIM [24]

You're setting the value of user_num to 20. Doing this won't allow the other test cases to run. Simply delete that line and your code should work. This is the code I wrote:

user_num = int(input())

while user_num>=1:

   user_num/=2

   print(user_num)

I wrote my code in python 3.8. I hope this helps.

4 0
2 years ago
A ____________ is the intersection of a column and row in an excel spreadsheet.
kogti [31]

Answer:

a cell is the intersection of a column and row in an excel spreadsheet.

4 0
2 years ago
Other questions:
  • Which statements describe the advantages of using XML?
    12·2 answers
  • What is the data rate of a DS0 signal?
    10·1 answer
  • What does Adsl stand for?
    7·2 answers
  • Given an object context for an Entity Data Model named mmaBooks, which of the following statements would you use to add a Custom
    15·1 answer
  • If an improvement creates no significant change in a product’s performance, then it is a(n) ? a0 design improvement.
    6·1 answer
  • In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of s
    6·2 answers
  • Create a class named Horse that contains the following data fields: name - of type String color - of type String birthYear - of
    8·1 answer
  • Run the browser checker to see that the computer you are using now is set up for WileyPLUS. Which of the following browser funct
    15·1 answer
  • Which of the following statements is TRUE of the information systems (IS) department? A. The operations group monitors user expe
    8·1 answer
  • The signature area in a cover letter includes the sender's first and last name, followed by his/her job title (if applicable). *
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!