1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
3 years ago
5

How would you maximize the use of outsourced programmers?

Computers and Technology
1 answer:
Lerok [7]3 years ago
8 0

Answer:

the answer is: release them when the project is complete

Explanation:

You might be interested in
I NEED HELP PLEASE!! I just wanted to upgrade my i3 processor to an i7. I bought new hardware (motherboard, fan, etc) and now th
Dafna11 [192]

Answer:

Your processor might be incompatible with motherboard

Explanation:

One major thing to keep in mind while upgrading a PC hardware is comparability among hardware. If you are using incompatible hardware it can cause issues like this. There are websites available to let you check the compatibility of different components.

As you mentioned you upgraded your cpu and motherboard. Does your motherboard has the correct version of chipset to run new cpu. Do notice if there are any beep sounds when you power up your PC. If you don't hear beeps than your motherboard might be dead.

6 0
4 years ago
A security administrator has replaced the firewall and notices a number of dropped connections. After looking at the data the se
Nata [24]

Answer:

The correct answer is Option(A) i.e., An SQL injection attack is being

attempted.

Explanation:

In this given question some information is missing and is not the complete question. The missing is given as :

SELECT * FROM and ‘1’ = ‘1’

Which of the following can the security administrator determine from this?

A. The SQL injection attacked is being attempted.

B. An Legitimated connections is being dropped.

C. The network scan are being done by the system.

D. An attack of XSS is being attempted.

Now, coming to the answer "The security administration sees that an SQL injection is attempted while it notices a lot of connection dropped and has replaced with the firewall and will be the possible issue flagged on it, SQL injection is a type of injection that possibly executes harmful or malicious statements and effects any website or web application".

Hence the correct answer is Option A.

5 0
3 years ago
You are the IT security manager for a retail merchant organization that is just going online with an e-commerce website. You are
lions [1.4K]

Answer:

Input validation, Allowing script input, and Escaping metacharacters

Explanation:

A programmer can implement the most effective way to prevent XSS by validating input, coding defensively, escaping metacharacters, and rejecting all script-like input.

4 0
3 years ago
What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.e
lesya692 [45]

Answer:

Explanation:

ae

5 0
3 years ago
Some system analysts argue, "Give users what they ask for. If they want lots of reports and data, then that is what you should p
steposvetlana [31]

Answer:

I align with the second group of System Analysts.

Explanation:

Actually, in the IT world  most users want detailed explanations of processes, reports and data during their fault resolutions. However, they do not really know what to do with these nor would even make use of it when a fault occur on their system again. Thus, it is better for "<em>Systems Analysts to let the users know what information can be obtained from the system. If you let the users dictate, then you will never get anywhere and/or go down costly paths because the end-users really don't know what they want and do not have the technical knowledge or understanding of code, data-basing, and systems."   </em>

6 0
4 years ago
Other questions:
  • Text, numbers,graphics, sounds entered into a computer's memory during input operations are referred to as
    11·1 answer
  • Which of the following would help a photographer keep from dropping a camera? - - Rain hood
    6·2 answers
  • The most important protocol at the internet layer is ____.
    13·1 answer
  • To find if the Library owns the item listed below using Quick SearchLinks to an external site., what would you type in the searc
    9·1 answer
  • A woman puts on a business suit. Which post-WWII fashion does her clothing typify?
    12·2 answers
  • What network problems can be solved on your<br> end?
    13·2 answers
  • Types of network model​
    11·1 answer
  • What are some real-life situations where multi-dimensional arrays might be useful?
    8·1 answer
  • which of these devices has 3000-A fuses that provide fault protection for the 4000-a, 480/277-V, 3-phase bus that feeds seven ci
    5·1 answer
  • On a cdma (code division multiple access) network, how are mobile handsets identified by the carrier?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!