1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
13

The process used to obtain the information system resources needed to provide the services necessary to meet a specific set of _

______, no matter how broad or narrow, is known as system acquisition.
Computers and Technology
1 answer:
Olenka [21]3 years ago
4 0

System Acquisiton: The process used to get the information system resources needed to provide services that are necessary to meet a specific set of needs.

- 2 fundamental strategies for system acquisition:

1) buy off-the-shelf software

2) build a custom application.

You might be interested in
Select the correct text in the passage.
chubhunter [2.5K]

Answer:

The last bracket "define project scope and assumptions, estimate cost, create project feature requirements, and note risks."

Explanation:

Project proposals are showing the audience what the project is, how much it will cost them, necessary requirements to achieve, and risks (financial, physical, etc..). That sentence covers all of that.

5 0
3 years ago
Cobbling together elements from the previous definition and whittling away the unnecessary bits leaves us with the following def
pentagon [3]

Answer:

This is not plagiarism

Explanation:

The student has properly referenced the original source material, therefore, it is not plagiarism. Also, it is sufficient to just reference the attached source material author. Although it is implied that several other authors' material has been used in the source material, there is no need for the student to reference the other authors too.

3 0
3 years ago
What is meant by instruction pipelining in RISC processor? Whatare
Evgesh-ka [11]

Answer:

Explanation:

The instruction pipelining refers to various stages the instruction has to go through for the full execution of the instruction. Each instruction undergoes various stages in the execution, they are Instruction Fetch, Instruction Decode, Address Generator, Data Fetch, Execution and Write Back. Not every instruction may go through all the stages stated above. Pipelining exploits the parallelism in the execution of instructions (executing multiple instructions simultaneously ). Each instruction might be at different stage in the execution of program. It can be a 3-stage pipelining or 5 stage pipelining.

The implementation of Pipelining is a complex procedure.

In branch instructions, the complexity increases with the number of stages of pipeline.

7 0
3 years ago
How often do you trade cowoncy? If so, for what and how much?​
andreev551 [17]

There are different ways to trade cowoncy. There are some legitimate site to buy and sell it. In trade cowoncy, about 100000 Cowoncy is bought for $17.89USD.

Cowoncy is commonly described as the OwO bot's form of currency. It is known as a currency used worldwide in hunting.

Its role is mainly for for hunting and in the activation of one's huntbot and it is often used in other form of purchases such as cosmetics, etc.

Learn more about trade from

brainly.com/question/17727564

5 0
3 years ago
A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no
elena55 [62]

Answer:

d. Port mirror

Explanation:

Port mirroring is a method to monitor network traffic and it is used in the Intrusion Detection Systems. It is also called Switched Port Analyzer and is used to analyse the network errors. This technique basically copies the network packets and sends or transmits these copied packed from one port to another in a network device such as a switch. This means that this technique is used to copy the network packets from one switch port and send the copy of these packets to another port where these packets are monitored. This is how it analyses the network errors and incoming traffic for irregular behavior and also this can be done without affecting the normal operation of the switch and other network processes. It is simple, inexpensive and easy to establish and use. The most important advantage of using mirrored ports is that it catches the traffic on several ports at once or can capture all of the network traffic.

4 0
3 years ago
Other questions:
  • Caesar Cipher is an older and since outdated encryption technique used by Julius Caesar to "hide" messages he sent to his troops
    5·1 answer
  • Write a Python program that gets a number using keyboard input. (Remember to use input for Python 3 but raw_input for Python 2.)
    8·1 answer
  • A rich text format (RTF) provides an electronic image of a document and can be viewed, printed, and electronically transmitted.
    7·1 answer
  • ______ engineers build prototype cars and troubleshoot them.
    8·2 answers
  • Forms are used to a provide a more user-friendly way to work with data in tables
    14·1 answer
  • How do you add a section break that would start the new section on the same page?
    12·2 answers
  • Having one password for all accounts is an easy way to remember passwords, but it will expose you to what risk?
    15·1 answer
  • (TCO 4) What will the following program segment display? int funny = 7, serious = 15; funny = serious % 2; if (funny != 1) { fun
    14·2 answers
  • It is generally safe to download mobile apps from<br>unknown sources.​
    9·2 answers
  • What specific record type is found in every zone and contains information that identifies the server primarily responsible for t
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!