1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgesh-ka [11]
3 years ago
15

A sequence of repetitive operations performed to evaluate the ability of a PC to operate at peak efficiency for a defined time p

eriod under a maximum processing load is called a benchmark.
A. True B. False
Computers and Technology
1 answer:
iragen [17]3 years ago
8 0

Answer:

False.

Explanation:

The description provided matches better with Software performance testing, and shouldn't be confused with a benchmark.

In computing, a benchmark is a tool or software designed to measure the average performance of another program, by running several tests and trials against it.

A performance testing is designed to measure the performance and responsiveness of a computer system (not a program) under a heavy workload.

You might be interested in
A computer is not connecting to certain network devices properly. the ip address information is as follows: ip address: 192.168.
larisa [96]
192.168 suggests class C networks which have a 24 bit netmask (255.255.255.0) but you haven't provided enough info, like the netmask of a working machine, to be definite.
3 0
3 years ago
Explain how can we determine that where is the strength of magnetic force maximum in a
snow_lady [41]

Answer:

by making a experiment

Explanation:

8 0
2 years ago
Which architecture for deploying a firewall is most commonly used in businesses today? Why?
zmey [24]

Answer:Screened Subnet Firewall

Explanation:Screened Subnet Firewalls is the firewall deploying mechanism that is used at the present time in the organizational area.It is used as because it is supposed to be a good option as it protects the networks and DMZ operating system from any kind of virus that can damage the connection. It works as the security section and protects the system.

8 0
3 years ago
C++
Nookie1986 [14]

Answer:

Following are the code to the given question:

#include <iostream>//header file

using namespace std;

class Window //defining a class Window

{

private:

int width, height;//defining integer variable

public:

friend ostream& operator << (ostream& stm, Window& width)//defining a friend function that takes two parameters

{

return stm<<"a ("<<width.width<<" x "<<width.height<<") window"; //use return keyword that return its values

}  

Window(int width, int height): width(width), height(height)//defining parameterized constructor that inherit width and height in its parameters  

{}

};

int main() //Main method

{

Window w(80,90);//calling class constructor

cout<<w;//print object value

return 0;

}

Output:

a (80 x 90) window

Explanation:

In the above code, a class "Window" is defined that uses a friend function "ostream& operator" is declared that uses the "ostrea&" as a data type to hold two-variable "stm and w" in its parameter, and declared the parameterized constructor to hold value by inheriting width and height in its parameters.

Inside the main method, a class object is created that calls the constructor and uses the print method to print object value.

7 0
3 years ago
We use _____command to get data from the user? (python)
Genrish500 [490]

Answer:

INPUT

Explanation:

EXAMPLE PYTHON CODE

_______________________________________________________

INPUT CODE:

_______________________________________________________

foo = input('foo: ')#Have some text printed before the input field

bar = foo

print(bar)

_______________________________________________________

OUTPUT CODE:

_______________________________________________________

foo: Hello World!

Hello World!

>>> bar

'Hello World!'

>>>foo

'Hello World!'

5 0
3 years ago
Other questions:
  • toThePowerOf is a method that accepts two int arguments and returns the value of the first parameter raised to the power of the
    6·1 answer
  • Join my discord server! CODE IS (CebjBXN)​
    12·2 answers
  • Who can search the internet and select element base on important words
    13·1 answer
  • Create a class named Invoicing that includes three overloaded computeInvoice() methods for a book store: see pages 196 for examp
    7·1 answer
  • Which of the following statements about security in the network is true?
    15·1 answer
  • Pls help will mark brainliest as soon as u awnser
    15·1 answer
  • In a three-tier architecture, the component that runs the program code and enforces the business processes is the:_______.
    11·1 answer
  • El botón de layout se usa para <br>​
    8·1 answer
  • Is this statement true or false? Title text boxes on every slide must be the same format. True false.
    8·2 answers
  • When network traffic is encrypted, it is invisible and its content and purpose are masked.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!