1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
max2010maxim [7]
3 years ago
6

Hypercompetition implies that any architecture must be designed with maximum flexibility and _____ to ensure it can handle the i

mminent business changes. modularity quantity scalability sustainability availability
Computers and Technology
1 answer:
Natali [406]3 years ago
7 0

Answer:

scalability

Explanation:

Hypercompetition implies that any architecture must be designed with maximum flexibility and scalability to ensure it can handle the imminent business changes.

You might be interested in
Fifty part-time students were asked how many courses they were taking this term. The (incomplete) results are shown below. Need
Ne4ueva [31]

Answer:

The answer for B is 10% and for C is 40%.

Explanation:

To get the percentage for B you take the the frequecy of students taking 2 courses (5) and multiply it by 100 then you divide it by whole number of students.

For C you do the after adding the number of students taking 1 or 2 courses (20).

5 0
3 years ago
What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?
Aleksandr [31]

Answer:

The absolute most decimating ransomware and Trojan malware variations rely upon vulnerabilities in the Windows Server Message Block (SMB) to proliferate through an association's system. Windows SMB is a convention utilized by PCs for record and printer sharing, just as for access to remote administrations.  

A fix was discharged by Microsoft for SMB vulnerabilities in March 2017, yet numerous associations and home clients have still not applied it. So now, the unpatched frameworks permit dangers that exploit these vulnerabilities inside, helping dynamic malware crusades spread like Californian rapidly spreading fire.  

SMB vulnerabilities have been so effective for danger entertainers that they've been utilized in the absolute most unmistakable ransomware episodes and refined Trojan assaults of the most recent two years. Truth be told, our item telemetry has recorded 5,315 discoveries of Emotet and 6,222 of TrickBot in business systems—two Trojan variations that are utilizing the SMB vulnerabilities—over the most recent 30 days alone.

7 0
3 years ago
Read 2 more answers
Which part of the input-process-output model is line 2 in the program below? strWeight = input("Enter your weight in pounds: ")
frutty [35]

Answer:

process

Explanation:

Given

The program in python

Required

What does line 2 represents

The line 2 of the program is: weight = float(strWeight)

And what it does is that it converts the input weight from string to float after the user supplies value for strWeight

This conversion not input, output, neither is it planning. It is process because according to the program it prepares variable weight to be printed as float on line 3

4 0
3 years ago
List 4 activities that might be included as part of a dependable software engineering process. Which of these do you think are m
Bogdan [553]

Answer:

  • Requirement Management
  • Requirement Reviews
  • Requirement Specification
  • System Modeling

Explanation:

Requirement Management  and specification are most suitable for agile project.

7 0
3 years ago
When should you talk to an adult you trust
Gnesinka [82]

Answer:

you should talk to them when u think its the right time and you think u can trust them

5 0
4 years ago
Other questions:
  • RDBMS stands for_________________
    12·1 answer
  • An administrator needs to make sure that video conferencing is allocated a high portion of bandwidth within a company network. W
    11·1 answer
  • In graphical linear programming to maximize profit, the objective function is: I. a family of parallel lines. II. a family of is
    11·1 answer
  • Fuction table of JK-Flip flop?
    11·1 answer
  • Write a C class, Flower, that has three member variables of type string, int, and float, which respectively represent the name o
    12·1 answer
  • Write a function header for the ZooAnimal class member function daysSinceLastWeighed. This function has a single integer paramet
    10·1 answer
  • La tensión en Newtons necesaria para que una onda transversal cuya longitud de onda es​
    10·1 answer
  • List any four e-commerce website​
    5·2 answers
  • if someone has become very attached to their mobile device and feels anxious if the cannot connect to the internet, what are the
    7·1 answer
  • The format that you will use on your works cited page when the entry is longer than one line is__________.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!