1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eva8 [605]
3 years ago
9

The ability to adapt to increases or decreases in demand for processing or data storage is known as ________. Group of answer ch

oices scalability usability reliability portability extensibility
Computers and Technology
2 answers:
zalisa [80]3 years ago
7 0

Answer:

The correct answer is Scalability

Explanation:

Scalability is defined as the ability of a computing process to be produced in various capabilities. This means that it entails the ability to adapt to decreases or increase in demand for data storage and processing.  When a system can perform without any problems under an expanding and increasing scope, this concept is known as scalability.

Talja [164]3 years ago
6 0

Answer:

Scalability

Explanation:

<em>Scalability </em>is a generic term for the ability of a system to accommodate expansion. A system is scalable if it is able to adapt to changes in growth - either as an increase or a decrease.

<em>Extensibility</em> of a system is its ability to be easily modified. In other words, the ease of scalability of a system is a measure of its extensibility.

<em>Usability</em> of a system is the measure of how easy it is to use the system. It is the quality of the experiences of the users interacting with the system.

<em>Portability</em> of a system is its ability to be used or run in diverse environments.

<em>Reliability</em> of a system is the ability of the system to be used without failing over a specified period of time.

Therefore, the term that best describes the scenario is <em>Scalability.</em>

<em></em>

<em></em>

<em></em>

<em></em>

You might be interested in
Does anyone know the name of the font :) ?
alekssr [168]

<em>Schoolbell Pro.</em>

<em>Hope this helps. Have a nice day.</em>

5 0
3 years ago
Read 2 more answers
What is Gamekit Loa3's all questsions
Stells [14]
Video games and currency premium playing
4 0
4 years ago
True or false Encryption prevents hackers from hacking data?
nlexa [21]

Answer:

The answer here is False.

Explanation:

Encryption protects the data and not access to data.

In some cases, the hacker may not necessarily be trying to access or decrypt the data. They may prevent one from accessing it by placing a Ransomeware virus on it.

What a Ransomeware virus would do is to prevent the legal and rightful owner from accessing such data (whether encrypted or not) until their demands are met.

In many cases, they would ask for monies or cryptocurrencies.

Another way hackers attempt to get encrypted files is to try to get the decryption keys instead. The best practice against this is to keep decryption keys manually or in a password manager. Another way to protect very sensitive information is to have sensitive systems isolated from the internet.

Cheers

8 0
3 years ago
If you want a user to enter exactly 20 values which loop would be the best to use
miskamm [114]
The answer to this is 'for'
3 0
3 years ago
The basics of color theory assume what central tenets
fomenos
Color has important psychological and visual effects on the audience
5 0
3 years ago
Other questions:
  • Financial goals are helpful because they
    7·1 answer
  • A computer ____ is the amount of data (measured in bits or bytes) that a cpu can manipulate at one time
    8·1 answer
  • Hey im trying to get a refund because i got charged 24$ for the yearly plan and i didnt know i would get charged can i get the y
    11·1 answer
  • Vpns can be classified based on the kinds of ____ they connect
    6·1 answer
  • A(n) __________ is a recording of a motion picture, or television program for playing through a television.
    8·2 answers
  • How to select the entire table in microsoft excel
    11·1 answer
  • To prevent injury when pulling a nail be sure the material holding the nail is
    14·1 answer
  • Which of the following tasks can you perform using a word processor?
    12·1 answer
  • 4. Write an appropriate comment for describ-
    11·1 answer
  • The Spanning Tree Protocol operates at the Network layer of the OSI model.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!