1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesantik [10]
3 years ago
9

Discuss about the main frame computer​

Computers and Technology
1 answer:
Nimfa-mama [501]3 years ago
7 0

Answer:

Mainframes (also called "big iron")[1] are powerful computers used for large information processingjobs. They are mainly used by governmentinstitutions and large companies for tasks such as census, industry and consumer statistics, enterprise resource planning, and financial transaction processing. Mainframe computers are specially used as servers on the World Wide Web (WWW). They are distinct from supercomputers.

You might be interested in
The objective of ____ testing is to identify and eliminate execution errors that could cause a program to terminate abnormally,
Ann [662]

Answer: I would say "user" is the correct answer

Explanation: This question is clearly talking about a computer program so the "user" is like a BETA tester. "Someone who tests games, websites, and apps before they are released.

3 0
3 years ago
What is the easiest way to deploy a C++ program to a user’s computer? a. Copy the source code to the user’s computer and then co
Morgarella [4.7K]

Answer:

c. Copy the executable file to the user’s computer

Explanation:

When you run a c++ program, an executable file (.exe) is created in the same directory with the source file.

To deploy this program on another system, you need to transfer the executable file from the original system where the program was executed to the new system.

The program will work fine without errors.

However, do not mistake the executable file for the source file. The source file ends in .cpp.

8 0
3 years ago
Which form of investigation aims at checking whether or not a target system is subject to attack based on a database of tests, s
VikaD [51]

Answer:

<em>Empirical technical </em>research has a fundamental objective, which is to provide objective and independent information on the quality of the product to the interested party or stakeholder. It is one more activity in the quality control process.

Explanation:

Testing is basically a set of activities within software development. Depending on the type of tests, these activities may be implemented at any time during said development process. There are different software development models, as well as test models. Each one has a different level of involvement in development activities.

In a full penetration testing process, there are pre-instances to run this tool, but to take the first steps it is probably the best way to start. Nmap is a network scanning tool that allows you to identify what services are running on a remote device, as well as the identification of active computers, operating systems on the remote computer, existence of filters or firewalls, among others.

In simple words, when a server or device is going to be attacked, the attacker can carry out different attacks depending on the service: it is not the same to damage a web server, a database server or a perimeter router. Therefore, in any deployment, the first step will be to identify the services in the infrastructure, to decide how to proceed and, considering that in a penetration test the steps of an attacker are “imitated”, it will also be started in the same way.

5 0
3 years ago
Explain why the process of sketching in engineering might resemble a loop or a cycle.
Valentin [98]

Answer:The process of sketching in engineering might resemble a loop because of the design process.

Explanation: The design process is a loop or cycle to improve a design. So, sketches will be shown to other engineers and they will improve on the design until it is effective and efficient.

6 0
3 years ago
Read 2 more answers
Press the _______ key to move to the next cell in a row.
slamgirl [31]

Tab is the answer! And it says i need 20 chacters to explain so im writing random stuffff



4 0
3 years ago
Other questions:
  • Why does the hp computer not have Bluetooth?
    6·1 answer
  • Over time, attackers have had to increase their skills to be able to attack systems or create viruses. True False
    8·1 answer
  • Themes are applied from which tab?
    6·1 answer
  • In the space below, write the formula that needs to be added to the blank cells under the fourth column of the table.
    13·1 answer
  • Question 4: What will be the output of the code? Show a complete analysis.
    6·1 answer
  • JUST MAXED OUT THE COMMENTS anyways come here
    7·2 answers
  • Desktop and personal computer are also known as​
    7·1 answer
  • Helpppppppppppppppppppppppppppppppp
    13·2 answers
  • a) pencil b) ink bottle c) polygon d) eye 3. Under which of the following can an operating system be classified? b) software c)
    8·1 answer
  • Taran wants to work in the technology field but is unsure of which career to pursue. He has been told he has strong people skill
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!