1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
2 years ago
5

How would you maximize the use of outsourced programmers?

Computers and Technology
1 answer:
Lerok [7]2 years ago
8 0

Answer:

the answer is: release them when the project is complete

Explanation:

You might be interested in
Do Y’all know how to view your answers to others people questions on your profile? Please answer fast
Pavlova-9 [17]

:Answer:first: <em>click on your profile you should see a little head after</em>, scroll all the way down u should see a <em>view proflie</em>-click on it after, u shoud see a <em>questions asked and questions answered</em>

<h2><em>hope this helped!!</em></h2>

Explanation:

5 0
2 years ago
Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of
Anvisha [2.4K]

Answer:

import random

numbers = []

even = 0

odd = 0

for i in range(100):

   numbers.append(random.randint(1, 200))

for i in range(100):

   if numbers[i] % 2 == 0:

       even += 1

   else:

       odd += 1

print("Even:", even)

print("Odd:", odd)

Explanation:

Gg ez.

8 0
2 years ago
Def rectangle_area(base,height):
user100 [1]

Using the computer language in python to write a function code that calculates the area of ​​a rectangle.

<h3>Writting the code in python:</h3>

<em>def rectangle_area(base, height):</em>

<em> z = base*height  # the area is base*height</em>

<em> print("The area is " + str(z))</em>

<em>rectangle_area(5,6)</em>

See more about python at brainly.com/question/18502436

#SPJ1

6 0
1 year ago
9 dmz, vpn, vlan where in the network do you place a dmx, why, what attacks are prevented? what does a vpn do, provide an exampl
creativ13 [48]

At the: Firewall, the DMZ is configured in the Organization. Within the firewalls, it is accessible. They have been completed with the intention of adding an additional layer of safety to the organization to protect it.

The DMZ safeguards not only the web server but also the remainder of the network. To allow visitors to the network to access the web server, a security breach must be made.

The DMZ lessens the possible risk caused by this gap. A secure network, protected by the FortiGate, that only permits access if it has been specifically authorized is known as a DMZ network (from the term "demilitarized zone").

In this illustration, a private subnet is used by the DMZ network, which permits access to a web server by internal and external users using distinct addresses while blocking access from the web server to the internal network in the case that the web server is compromised.

To know more about DMZ click on the link:

brainly.com/question/2920815

#SPJ4

7 0
1 year ago
How to make your nest learning thermostat stop doing something
k0ka [10]

Answer:

You could unplug it? LOL

and get a different thermostat.

Explanation:

Could you mark this answer as brainiest?

Thanks! :)

4 0
3 years ago
Other questions:
  • True or false words spelling and grammar check is always %100
    7·2 answers
  • How can you tell that a website is valid and reliable
    7·2 answers
  • Data types influence the following in the workflow: (Select all that apply)a. the color choices and layout decisions around comp
    15·2 answers
  • Making the data impossible to recover even by applying physical forensics methods is known as __________ of media.
    13·1 answer
  • Weak Induction
    8·1 answer
  • .In Python, comments begin with the comment marker and continue ______.
    14·1 answer
  • Of the following online activities, identify the TWO that are most likely to be affected by bandwidth quality
    11·1 answer
  • An IT suspects that an unauthorized device is connected to a wireless network. This is a result of passkey sharing on a device b
    14·1 answer
  • What is a thoughtware​
    7·1 answer
  • Viruses that load from usb drives left connected to computers when computers are turned on are known as.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!