1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wel
4 years ago
12

There are some network modeling tools that can ________ the existing network.

Computers and Technology
2 answers:
svetlana [45]4 years ago
7 0

Answer:

There are some network modeling tools that can verify the existing network.

Explanation:

Network Modeling is an Operational Research (OP) technique that consists of a set of methods for reading business data for decision-making optimization. This technique is also considered a decision support tool, aiming at cost optimization, logistics, energy, production, among others. Within network modeling there are some network modeling tools that can verify the existing network.

lesya [120]4 years ago
4 0
<span>There are some network modeling tools that can scan the existing network.</span>
You might be interested in
Marie can now edit her photos, send them in emails, print them on a printer, and use them as wallpaper on her computer. This is
AVprozaik [17]

I could be wrong, but I believe this one would be JPG files.

4 0
4 years ago
Read 2 more answers
What is extraction, transformation, and loading? Group of answer choices It is a process of entering data, tracking data, and lo
Tcecarenko [31]

Answer:

It is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

Explanation:

Extraction, transformation, and loading can be defined as a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

7 0
3 years ago
__________ is software that comes hidden in free downloadable software that tracks online movements, mines the information store
denis23 [38]

Answer:

Spyware

Explanation:

Spyware is the software which is used to track the online movements, it also track the user action on the computer they are also called sneakware  or stealthware

  • This software is used  in the business purpose which it may be used in the office to track the record of employee in the working hours .
  • Spyware  software is used to track the information without knowing the user.

 

7 0
3 years ago
Whats the lore in night in the woods?
Murljashka [212]

Answer:

NIGHT IN THE WOODS is about an anthropomorphized cat named Mae, a college dropout who returns to her hometown of Possum Springs to reconnect with her family and friends

Explanation:

6 0
2 years ago
Read 2 more answers
Each device attached to your computer has a special program called a(n ________ that enables the device and operating system to
koban [17]
The answer is Device Driver
8 0
3 years ago
Other questions:
  • Create a test that prompts a user to enter a 5-digit PIN in the main procedure and then calls Validate PIN procedure to validate
    12·1 answer
  • Can someone fix this so that it only says "its a payday" on 15 and 30 and on all other days "sorry, it's not payday"
    9·1 answer
  • Consider the following page reference string:
    12·1 answer
  • A computer is a(n) ____ device, operating under the control of instructions stored in its own memory, that can accept data, proc
    9·1 answer
  • What is the other alternative keyboard to the qwerty?
    10·2 answers
  • Joshe is a project leader in Tiran technologies. 75 developers and analysts work under his supervision on several projects. Thes
    12·1 answer
  • The sun is a type of what?
    9·1 answer
  • Term of The surroundings and conditions of your workplace
    6·1 answer
  • Question 1
    10·2 answers
  • Why is a Quality assurance tester needed on a software development team?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!