1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
3 years ago
15

What does it mean to design, implement, and maintain computer systems?

Computers and Technology
1 answer:
docker41 [41]3 years ago
8 0

Answer:

Let's take an example of the embedded system, which is a perfect example of this question as a computer system. Suppose we want the embedded system to record the details related to soil of agricultural land. We will take an IoT device which will be a sensor that can register soil properties, and get connected to the computer system through the internet. And we design an embedded system that registers these values and then copy them like somewhere in DB space on Amazon cloud or Google cloud. And finally display on some LCD or a big projector, or whatever, and like we design. Thus we have designed, and now when we install this on agriculture land, we implement it, and since check regular for correct performance, we maintain this embedded or a mini-computer system as well. This is what design, implement and maintain computer systems mean.

Explanation:

Please check the answer section.

You might be interested in
Value appears on the left hand side of cell <br> true or false
11111nata11111 [884]

Answer:

True

Your welcome

.........

4 0
2 years ago
Read 2 more answers
Prostate cancer can physically affect both men and women
Naddika [18.5K]
Correct but men are more prone to it.
7 0
3 years ago
How do you insert text into a presentation?
ElenaW [278]

Answer:

Its most likely the last one

Explanation:

But like, what kind of quesiton is this?

7 0
2 years ago
Read 2 more answers
Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that eb
myrzilka [38]

The first step that Ebba should take is: Information gathering and Reconnaissance.

<h3>What is an In-house Penetration Test?</h3>

An in-house Penetration test is a form of offensive test that is aimed at finding the lapses that a system has and initiating attacks to know the best way to prevent them.

Before launching such a test it is advised to plan and gather information about the possible lapses.

This will help the pen tester to know what attacks to launch and the right measures to resolve them. So, the first step that Ebba should take is Information gathering and Reconnaissance.

Learn more about In-house Penetration test here:

brainly.com/question/19085749

3 0
1 year ago
The same student is curious about how a Web site appears on his computer screen. On a separate piece of paper, draw and explain
Ksivusya [100]

Answer:

HTTP is the application layer protocol required.

Explanation:

For a web page to be displayed on a browser, the seven layers of the OSI model work together. On the application layer, HTTP protocol is used to communicate between the server and the client. The HTTP client is the browser (Chrome, Internet Explorer, Firefox etc.) which sends a request to the HTTP server for accessing a web page.  

When a URL is accessed, the HTTP client sends a request to the HTTP server. The server locates the file which is being requested and sends a response message containing the web page which is to be displayed. The exchange of data between the HTTP client and server takes place over a TCP connection.

TCP is a transport layer protocol which provides a reliable connection over which the exchange of data takes place. Data at the transport layer is sent in the form of segments. If the data being sent from the server is too long, it is divided into multiple segments and sent one after the other. The client is then responsible for joining the segments and displaying the information as a web page. The transport layer is also responsible for error correction and detection during the communication process.

If the student is sending or retrieving information from a secure website, the messages being exchanged between the client and server will be encrypted. This means that if a third-party tries to tap the communication process, they would not be able to decipher the messages. This increases the security and helps keep the information present on the web page confidential.

8 0
3 years ago
Other questions:
  • Which of the statements below is false? Question 19 options: a) You can install a 64-bit operating system on a 64-bit machine. b
    12·1 answer
  • 12. Noodle Tools is a website that
    8·1 answer
  • All animations on the world wide web are flash animations
    11·2 answers
  • (1) The given program outputs a fixed-height triangle using a * character. Modify the given program to output a right triangle t
    6·1 answer
  • You are building a gaming computer and you want to install a dedicated graphics card that has a fast gpu and 1gb of memory onboa
    15·2 answers
  • A ________ is a user-interface component with two states: checked and unchecked. radio button check box menu item submenu item
    5·1 answer
  • What includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology
    7·1 answer
  • Which library research databases include information about articles published in magazines, journals, and newspapers? question 1
    7·1 answer
  • Windows stores information from the Credential Manager application in secure folders called
    5·1 answer
  • Write a method that takes two circles, and returns the sum of the areas of the circles.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!