1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DENIUS [597]
2 years ago
6

Which of the following types of computers is typically used by governments and hospitals and can support hundreds of users?

Computers and Technology
2 answers:
jeka57 [31]2 years ago
6 0
I think the answer is D. Mainframe computers
Paha777 [63]2 years ago
4 0

Answer:

D. Mainframe computers

Explanation:

Mainframes computers are those generally known for their large size, amount of storage, processing power and high level of reliability. They are primarily used by large organizations for mission-critical applications requiring high volumes of data processing. All mainframes have the ability to run (or host) multiple operating systems and can add or hot swap system capacity without disruption. Moreover, mainframe computers can replace dozens or even hundreds of smaller servers.

You might be interested in
Write a MATLAB program to accomplish the following: Create two vectors, a and b, where vector a contains all positive integers l
sattari [20]

Answer:

Explanation:

Below is the complete MATLAB code that performs the given operations.

a = 10:10:99 % Generating first vector

b = 2:2:18  % Generating 2nd vector

c = rdivide(a,b) % Dividing vector a by b and storing in c

d = times(c,c) -19 % Subtracting 19 from each element of vector c

c % Displaying value of c

d % Displaying value of d

Output screenshot

C =

 5 5 5 5 5 5 5 5 5

d =

6 6 6 6 6 6 6 6 6

3 0
3 years ago
Create an array named itemDescription containing the following item descriptions:
Lelu [443]

Answer:

var itemDescription = ["1975 Green Bay Packers Football (signed), Item 10582", "Tom Landry 1955 Football Card (unsigned), Item 23015", "1916 Army-Navy Game, Framed Photo (signed), Item 41807", "Protective Card Sheets, Item 10041"];

Explanation:

The following solution will work with javascript. Here we've stored different items in a variable named itemDescription.

8 0
3 years ago
you need to configure a wireless network using wpa2-enterprise. which of the following components should be part of your design?
Iteru [2.4K]

Answer: AES encryption

802.1x

Explanation:

4 0
2 years ago
The ____ command can be used to view the contents of a record when it is anticipated that the record will need to be modified. I
GREYUIT [131]

Answer:

The correct answer is B)

Explanation:

The commit command allows us to:

• Consolidate, confirm

• committing refers to the idea of confirming a set of provisional changes permanently.

• A popular use is at the end of a database transaction.

•

The LOCK TABLE command should be used:

• when a lock of the mode specified in the table can be acquired.

• The command will wait for everything you need to get the lock,

• In case you cannot acquire the lock immediately, the NOWAIT option is specified so that the command cancels the transaction.

6 0
3 years ago
1
diamong [38]

Answer:

DHTML (Dynamic HTML) is a collection of a few different languages

Explanation:

Dynamic HTML is a collection of HTML, DOM, JavaScript, and CSS.

It allows for more customizability than regular HTML. It allows scripts (JavaScript), webpage styling (CSS), manipulation of static objects (DOM), and building of the initial webpage (HTML).

<em>Since the question is incomplete, I'm not really sure what all you need answered - please leave a comment if you would like something else explained. :)</em>

3 0
3 years ago
Other questions:
  • Which writing format is also beneficial to public speaking? a. Five paragraph essay c. Conventions b. Prose d. None of these
    5·2 answers
  • What is SoC? how is it different from CPU?
    14·1 answer
  • 1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disable
    6·1 answer
  • If you said the bottom margin, you are talking about what?
    13·2 answers
  • Users who are connecting to an NLB cluster have been complaining that after using the site for a few minutes they are prompted t
    15·1 answer
  • In a network, multiple critical paths can occur. true or false
    13·2 answers
  • c) If you are at foreign country visit, which banking card would you prefer to keep with you during visit (Debit Card or Credit
    10·1 answer
  • What would give Lucy, an entry-level candidate, an edge over others while she seeks a programmer’s position? Lucy, an entry-leve
    11·1 answer
  • What's the best item in the binding of isaac?
    13·1 answer
  • STOP DELETING MY ANSWERS AND QUESTIONS!!!!!!!
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!