1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
6

Need answer ASAP!!!!!

Computers and Technology
1 answer:
borishaifa [10]3 years ago
6 0

Answer:

Option C

Explanation:

Periodic check are similar to period inspection done by a team comprising of software developers who check the flow and output of the core during the different stages of software development.  

The team also do the auditing to check whether the work products meet the different client requirement and thus revise the project plans.

Hence, option C is correct

You might be interested in
Describe how you could obtain a statistical profile of the amount of time spent by a program executing different sections of its
Mazyrski [523]

Answer:

Explanation:

It can be said that the best way to obtain such a statistical profile would be to issue a periodic timer interrupt, then you would simply need to monitor which what code was running when the interruption took place. This information is especially helpful to the programmers as it would allow them to optimize the specific sections of the code that are consuming the most CPU resources, and thus making the overall program more efficient.

7 0
3 years ago
The _____ stage of information technology planning outlines business processes that are central to achieving strategic goals and
bija089 [108]

Answer:

d. business area analysis

Explanation:

Business area analysis is the stage of information technology planning outlines business processes that are central to achieving strategic goals and helps determine which ones could most benefit from information technology.

Here the major focus is on planning the outlines required to achieve the central objective of business.

It outlines all the business process, the goals and helps to determine the most benefit from information technology.

3 0
3 years ago
Two electronics students are discussing static electricity and electric current. Student A says that a basic property of static
Svet_ta [14]
The answer is D. Only student B is correct. Student A is incorrect because static electricity can be detected through the principle of electrostatic induction, which will indicate if there are static electricity on the surface of an object. A device which can detect static electricity is an electroscope. Moreover, for student B, it is correct that the cause for electric current to flow is the uniform flow of free electrons.
3 0
3 years ago
A healthcare organization received notification that a hospital employee’s laptop that contained PHI was inadvertently left at a
timofeeve [1]

Answer:

Implement better protection and inform the staff.

Explanation:

The situation given in the question can be very alarming for a healthcare organization since the laptops contain critical information and details about the employee's work.

To prevent this from occuring again in the future, the organization should educate their employees on cyber security and having a strong password. They also should implement softwares on the computers against such incidents, which can be softwares that can lock the computers and delete files that are important to the organization if an unauthorized entry is detected. In order to protect the information, they can also use a backup system for every computer the employee's use.

I hope this answer helps.

7 0
3 years ago
Rikki has had several problems at work recently. Her printer isn't printing correctly, copies from the copy machine come out wit
Ghella [55]
Create a maintenance schedule 
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which command should you enter to configure a single port to discard inferior bpdus 200-125?
    5·1 answer
  • A ____ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet)
    14·1 answer
  • Generally, the more secure the system, the less usable it becomes. <br> O True O False
    9·2 answers
  • What is technology??
    12·1 answer
  • What feature, new to Windows Server 2012, provides the ability to find identical sets of data on a SAN-based storage array and r
    13·1 answer
  • When you expand the virtual size of a game, what do you create?
    7·1 answer
  • Where do animators work?
    6·1 answer
  • What is the full form of ARPANet, WAN,FTP,DCP,HTML,ISP and last WWW​
    12·2 answers
  • PLS HELP subject (Microsoft Excel ) True or False:
    9·1 answer
  • if a manager identifies numerous data integrity issues, she/he should consider the reports generated from that data as invalid a
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!