1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ella [17]
3 years ago
12

Which model allows you to make subsystems in parallel?

Computers and Technology
1 answer:
boyakko [2]3 years ago
8 0
The model is Parallel Distributed Processing Model (PDP) wherein m<span>Memory results from weblike connections among interacting processing units operating simultaneously, rather than sequentially ( also known as the connectionist model).</span>
You might be interested in
Compare and contrast the role that business users play when software is developed using Waterfall and Agile software development
qaws [65]

Answer: Both Agile and waterfall model are software development models to deliver a final outcome in the form of a software product. Waterfall model is sequential process with the requirements beings rigid and defined before beginning the software development.

Agile method basically  concerned with the requirements of the client. Here both testing and development is carried out at the same time.

Explanation:

More differences between the two include :

Waterfall model is easy to manage whereas in agile model as the the client requirements changes and wants more functionalities is becomes a bit more difficult to manage. the role of project manager is very crucial in waterfall model whereas the role of developers ans testers is more important in Agile model.

8 0
3 years ago
Typically, when an organization purchases Internet access from an Internet Service Provider (ISP), the ISP will grant it
hodyreva [135]

Answer:

(B) A single public IP address that it can use for NAT

Explanation:

Because the IPV4 IP protocol is still used today, the number of available IP addresses is limited (only 4,294,967,296 addresses in the world), for this reason, the most correct practice is the assignment of a single public IP to those companies that acquire services from an ISP, with some few exceptional cases of companies that own several.

So that the company's addressing can be executed successfully, the use of NATs is enabled, this allows the translation of network addresses, allowing the company to have as many private networks as necessary and that these can be communicated Correctly with the global network, the Internet, through the public IP of the company.

7 0
3 years ago
You are studying for a test tomorrow. Your friends invite you to
lapo4ka [179]

Answer: C

Explanation:

7 0
3 years ago
If a= ‘ Stay home, Stay safe’ , print its value
Damm [24]

Answer:

Since the language isn’t stated, I’ll give answers in the two most-used (?) languages: Java and Python.

a) To print a’s value 3 times in the same line, in Java we would do:

System.out.print(a+a+a);

In Python, we would write:

print(a*3)

b) 2 times in different lines using one print statement

In Java, we would write

System.out.println(a+”\n”+a+”\n”+a);

In Python we would write:

print(a,a,a,sep=’/n’)

Hope this helps!

7 0
2 years ago
"You have a user who needs to keep desktop devices such as keyboard, monitor, and mouse permanently connected so that they can b
svet-max [94.6K]

Answer:

Docking Station is the correct answer of the following question.

Explanation:

A docking station is a technology system that is able to communicate capacities touchscreens with the other machines with few or no work.

The docking station is a system connecting a machine to many devices.

  • The docking station lets you attach to gadgets you have not been able to use in the future.
  • Not always connected with machines are docking station items such as sloped-panel displays and interchangeable lens cameras.
8 0
2 years ago
Other questions:
  • Which computing component is similar to the human brain
    6·2 answers
  • In what way(s) did the password you tried to use not meet the password policy requirements?
    14·1 answer
  • Antivirus software installed to scan and monitor malware activities on a server or workstation would be identified as a ________
    8·1 answer
  • Claudia has a bachelors degree in computer information systems and she has learned to use some popular software testing tolls wh
    13·2 answers
  • A store owner keeps a record of daily transactions in a text file. Each line contains three items: The invoice number, the cash
    7·1 answer
  • _KOH + _Cu(CIO3)2 - __KCIO3 +<br>_Cu(OH)2​
    12·1 answer
  • Your secondary servers have not been able to contact your primary server to synchronize information. How long will the secondary
    12·1 answer
  • Employers are looking for an employee?<br>​
    9·1 answer
  • Que es el sistema persona producto?​
    8·1 answer
  • Which components must all tasks have? Check all that apply.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!