1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka2103 [35]
3 years ago
11

Which of the following is an example of a long-term goal?Developing a lifetime savings plan

Computers and Technology
1 answer:
Lapatulllka [165]3 years ago
7 0

Answer:

Retirement fund/plan ?

Explanation:

You might be interested in
Give an example of an outdated memory or storage device what do you think they are outdated
andreev551 [17]

Answer:

HDD technology

Explanation:

You will find that there is a big difference between the SSD and the HDD. The SSD lists out the technical advantages as well as the disadvantages related to HDD, and this has led to the wide use of the SSD rather than the HDD, which is supposed by many being an outdated product. You will find that the SSDs last longer, and they are faster. However, the SSD is more prone to damages as compared to HDD. However, SSD looks like being more advanced considering the above-mentioned advantages, and fewer number of disadvantages. And hence, many people shifted to the SSD from HDD. Remember, SSD stands for solid state drives. And HDD means hard disk drive.

8 0
3 years ago
Message queues allow for programs to synchronize their operations as well as transfer data. How much data can be sent in a singl
ser-zykov [4K]

The maximum size of a message queue is 16384 bytes for Linux. For IBM WebSphere MQ. this value is 4 MB.

<h3>What is the message queue?</h3>

The size of the message queue refers to the size (in bytes) that a message may have for a given operative system.

For example, the maximum value for IBM WebSphere MQ has been configured in four megabytes (4 MB).

In this case, when the message is higher than the set size (here 4 MB), then this message is returned.

Learn more about IBM here:

brainly.com/question/896257

6 0
2 years ago
How do programmers recognise patterns, generalise and abstract information
Dima020 [189]

Answer:

Pattern recognition is the process of recognizing patterns by using machine learning algorithm. ... In a typical pattern recognition application, the raw data is processed and converted into a form that is amenable for a machine to use. Pattern recognition involves classification and cluster of patterns

Explanation:

4 0
3 years ago
. When would one use the analytic application fraud detection?
vaieri [72.5K]

Answer:Fraud detection through analytical method is used for detection of the fraud transactions,bribe activity etc in companies, business,etc. This techniques helps in the reduction of financial frauds in the organization, have the control over company to protect it,decrease in the fraud associated costs etc.

It has the capability of identifying the fraud which has happened or going to happen through the analytical ways and human interference. The organizations or companies require efficient processing and detection system for identification of such false happening.

4 0
3 years ago
Which layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two
s2008m [1.1K]

Answer:

Network.

Explanation:

The Transmission Control Protocol/Internet Protocol (TCP/IP) model is a standard networking protocol which allows network devices such as routers, switches, and host computers to interconnect and communicate with one another over a network. The Transmission Control Protocol/Internet Protocol (TCP/IP) model comprises of four (4) layers and these includes;

I. Application layer.

II. Transport layer.

III. Internet layer.

IV. Network layer.

The network layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two nodes.

Basically, this layer known as network layer is the fourth layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model and it is typically responsible for the transmission of packets from one network device to another.

4 0
3 years ago
Other questions:
  • A senior center would like to add a new computer to their library so that members can check their email and read book reviews
    11·2 answers
  • An administrator running a port scan wants to ensure that no processes are listening on port 23. What state should the port be i
    7·1 answer
  • Which command should you enter to configure a single port to discard inferior bpdus 200-125?
    5·1 answer
  • The continue statement _________.
    11·1 answer
  • Someone asks you for help with a computer that hangs at odd times. You turn it on and work for about 15 minutes, and then the co
    10·1 answer
  • The hottest part of the Earth is the
    9·2 answers
  • Design a flowchart for an algorithm which adds prim numbers starting from 1 up to 50. Change
    9·1 answer
  • 2 red and 2 overlapping balls in the center are surrounded by a green, fuzzy, circular cloud with a white line running through i
    15·2 answers
  • search engines use software that combs the web to find webpages and add new data about them to the database. what is this softwa
    5·1 answer
  • Consider our authentication protocol 4.0, in which Alice authenticates herself to Bob, which we saw works well (i.e., we found n
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!