1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nirvana33 [79]
3 years ago
5

This type of software can be described as end user software and is used to accomplish a variety of tasks. communications system

utility application
Computers and Technology
1 answer:
Butoxors [25]3 years ago
7 0
Provide additional information and request user<span> input</span>
You might be interested in
Which page layout is most commonly used for a website with a large navigation menu?
mestny [16]

Explanation:

The Name is called, (navigation menu..)

to direct users 2 info., they look up...

7 0
2 years ago
Which type of link is normally used to interconnect two peripheral modules (pm) in the digital multiplex system (dms)?
natta225 [31]

The answer is DS-30A. The Roland DS30A is a 24-bit Digital Reference Monitor which can add pristine 24-bit/96kHz. They are small speakers.

4 0
3 years ago
In addition to benchmark testing, performance measurements, called _____, can monitor the number of transactions processed in a
Shalnov [3]

Answer:

metrics

Explanation:

Given that Metrics is Metrics is an accepted technique of measuring quantities of elements or commodities.

It is used in all facets of human activities particularly in value measurement such as production operation, financial assessment, comparison purposes, etc.

Hence, In addition to benchmark testing, performance measurements, called METRICS, can monitor the number of transactions processed in a given period, the number of records accessed, and the volume of online data.

3 0
2 years ago
What can you look for on a website to indicate that the information it presents is reliable?
dybincka [34]

There are several things you can look for on a website to help you figure out if the information is reliable. The first thing you should evaluate is the audience that the website is intended for. Is it intended for academics? School children? The general public?


The next thing you should look at is the author of the website. Is the author identified? Is the author an expert in their field? Can you establish the author's credibility? Is the author affiliated to an academic institution or credible organisation?


Look at the accuracy of the website. Check for spelling errors, proper grammar, and well-written text. Are there any sources cited? Are those sources credible?


You should also check to see when the information was published. Is the information up to date? Are all of the links up to date and functioning?


There is one last thing you can look at, and this is the domain of the website. Domains like .edu and .gov are more credible than .com or .net domains.

5 0
3 years ago
Assume that source elements of length k are mapped in some uniform fashion into a target elements of length p. If each digit can
lukranit [14]

Answer And explanation

a)

r^k has 1/r^k probability guess the correct source

b)

Each element in r^p  is mapped by r^k / r^p . There are r^k^-^p  So there are  r^k^-^p -1 elements.

number of target elements = r^k^-^p

number of source elements = r^k^-^p -1

probability = r^k^-^p -1 /r^k

c) Probability of the correct target element

1/r^p

6 0
3 years ago
Other questions:
  • Which statement describes the word "iterative"?
    7·2 answers
  • Need answers for 11&amp;12. Due today. Thanks.
    14·1 answer
  • Modern ssds use a technique called "____" to spread write operations around the storage medium, thus evening out the impact of d
    13·1 answer
  • On many advanced routers and switches, you can implement QoS through bandwidth management, such as __________, where you control
    5·1 answer
  • Match each proofreading mark to the expected result.
    10·1 answer
  • What creative commons license allow for the work to be copied, distributed, displayed, or performed but modifications may not be
    13·1 answer
  • The concept of taking traffic that’s all aimed at the same node and delivering it to the proper receiving service is known as
    8·1 answer
  • Please help me !!
    10·1 answer
  • . Why is it important to use Social Media responsibly? ANSWER NOW!!!
    15·2 answers
  • Microsoft recommends when that you create passwords with upper and lowercase letters, numbers, symbols, and use at least _______
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!