1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
3 years ago
10

A ______ is a computer that controls access to the hardware, software, and other resources on a network. mainframe server workst

ation handheld
Computers and Technology
1 answer:
kykrilka [37]3 years ago
4 0
The answer is mainframe
You might be interested in
What is the basic similarities and difference between the three project life cycles model? ​
MAVERICK [17]

Answer:

Project life cycle is the time taken to complete a project, from start to finish.

The three project life cycles model include the following:

  • Predictive
  • Iterative and Incremental
  • Adaptive

Explanation:

Predictive project life cycles model: In this stage, the three major constraints of the project which are the scope, time and cost are analyzed ahead of time and this analysis is well detailed and the detailed scope of the project is done right from the start of the project.

Iterative and Incremental life cycles model: In this iterative and incremental model, the project is again split into stages that can be sequential or overlapping and at the first iteration of the project, the scope is determined ahead of time.

Adaptive life cycles model: Also in this stage, the project is split up into phases but because these phases are more rapid and ever changing unlike the other models, the processes within the scope can work in parallel.

Similarities

  • They make use of high level planning.
  • They are sequential and overlapping.
  • They make use of high level scope.

Differences

  • The predictive life cycle model makes use of a detailed scope at the beginning of a project while the other models make use of detailed scope only for each phase.
  • In predictive life cycle model, the product is well understood, in other models, the projects are complex and not easily understood.
  • There is periodic customer involvement in predictive and interative life cycle model while the customer involvement in the adaptive model, the customer model is continuous.

3 0
3 years ago
Define token. Give examples of 5 tokens in any programming language​
dimaraw [331]

<u>Tokens and its examples:</u>

Token is data type and it is behavior or categorized types. Basically most of programing language will have all five tokens data types and they are.

  • Operators.
  • Constants
  • Reserve words
  • Separators
  • Identifiers

Operators: - such as mathematic operations such as example: - “+”,”-“

Constants: - which used with CONST in vb.net or #define in c programming language, such as example: - 400,200.

Reserved words:- if , then are all used for if condition where if and then are reserved used in programming language for specific purpose.

Separators: - it used with write a procedure or function, in c languages “()” or “()” in vb.net sub and end sub.

Identifiers: - end user to define variable with data type class and store the value in the programming languages, such as amt = 0, rate=10.5.

8 0
3 years ago
How can you protect yourself from internet hoaxes cyber awareness?
Kipish [7]
Only add or follow people you know and trust make sure your account is nothing but positive
3 0
3 years ago
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
rodikova [14]

Answer:

The answer is "Option A".

Explanation:

A comprehensive collection of principles, guidelines, proposals, and studies on information and information systems privacy and safety are produced and carried out in the NIST publications.

  • The FIPS management standards for federal information and security laws contain various technical reporting sequences.
  • This process takes place after a plan is identified, reviews are carried out and risk analysis is performed.
8 0
4 years ago
Why are accountablity and trust so important in using emerging technologiess?
marta [7]

Answer:

improvied accuracy, quality and cost efficiencies

5 0
3 years ago
Other questions:
  • An example of an email client is:<br> A.)Yahoo<br> B.)Gmail<br> C.)Outlook<br> D.)All of the Above
    9·1 answer
  • When a process becomes digital, it often becomes cheaper and the workflow becomes simpler. True False
    5·2 answers
  • Using the FAFSA form , you can for apply for what
    14·2 answers
  • What is the maximum transmission speed for bluetooth v3 and v4 devices?
    12·1 answer
  • To complete this quest, answer the following questions in the submission box below. Make x an array going from 0 to 100 by steps
    15·1 answer
  • Plz help
    14·2 answers
  • After execution of the following code, what will be the value of input_value if the value 0 is entered at the keyboard at run ti
    6·1 answer
  • In many UNIX/Linux data and configuration files are "fields". Sometimes these fields are separated by:
    13·1 answer
  • 8. Given the array String[] words, which already contains 1 or more values, write a block of code which counts and returns the n
    7·1 answer
  • How many orbiting satellites are requested to provide uninterrupted around the clock GPS service around the world
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!