1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mamaluj [8]
2 years ago
5

9. Question

Computers and Technology
1 answer:
Gennadij [26K]2 years ago
5 0
A server stopped provide service to 100 users
You might be interested in
You need to fax a portion of a map from a large hard-cover atlas to a client from an internal fax-modem. To fax the map, the bes
Kay [80]
The fax modem is used to send and receive fax messages by only having phone line (fax machine is not required). The scanned documents should be saved as digital file (image or PDF format) in order to be sent. So, in order to send a portion of a map you should first convert the map into digital file and than simply send it through the fax modem. The best way to convert it to a digital file is to use an optical character recognition (OCR). 
6 0
3 years ago
Compare the applications below:
Karo-lina-s [1.5K]
The answer is the first response, by order of elimination, you can eliminate the rest.

HTML is a programming language that is used to design websites. You don't need to program a website to make a post on instagram, especially if you are using the app.

If you check the app store on your phone, you can find instagram in the app store, which lets you access it from your mobile device. Thus, the third option is wrong.

Finally, just read the description of instagram. It was made for sharing pictures, so the last option is wrong.
3 0
3 years ago
Consider the following line of code: if (x < 12 || (r – 3 > 12)) Write three valid mutants of this ground string (based on
Nata [24]

Answer:

See explaination

Explanation:

Mutation Testing:

Mutation Testing is a type of software testing where we mutate (change) certain statements in the source code and check if the test cases are able to find the errors. It is a type of White Box Testing which is mainly used for Unit Testing. The changes in the mutant program are kept extremely small, so it does not affect the overall objective of the program.

We say a mutant is valid if it is syntactically correct. We say a mutant is useful if, in addition to being valid, its behavior differs from the behavior of the original program for no more than a small subset of program test cases.

VALID MUTANTS

1. if (x < 12 && (r – 3 > 12)) LOR

2. if (x < 12 || (r – 3 < 12)) ROR

3. if (x < 12 || (x – 3 < 12)) IVR

INVALID MUTANTS

1. if (x < 12 ||(r – 3 > 12) UPR

2. if (x < 12 (r – 3 < 12)) MLO

3. (x < 12 || (x – 3 < 12)) CSM

Note:

LOR: LOGICAL OPERATOR REPLACEMENT

ROR: RELATIONAL OPERATOR REPLACEMENT

IVR: INVALID VARIABLE REPLACEMENT

UPR: UNBALENCED PARANTHISIS REPLACEMENT

MLO: MISSING LOGICAL OPERATOR REPLACEMENT

CSM: CONTROL OPERATOR MISSING REPLACEMEN

4 0
3 years ago
As we think of computer crime, there are ways in which thieves can steal your banking information through ATM machines. If you w
Travka [436]

Answer:NO, I WILL NOT GIVE THE TELEPHONE NUMBER

WHY?

IT IS A BREACH OF TRUST

IT IS A BREACH OF DATA PRIVACY

IT ALSO VIOLATES THE PRIVACY OF INFORMATION RIGHT OF THE GIRL.

Explanation:BREACH OF TRUST is act or actions taken against the signed agreement between a person and another party which may be any Organisation like a Financial Institution where the Financial Institution agrees not to release the personal Information about their customer without the person's consent.

IT IS A BREACH OF DATA PRIVACY many persons wants their data which are made available to Organisation to be kept private,divulging such information without the person's consent is a reach of data privacy.

It violates the privacy of Information right of the Girl, except for Security or other specified reasons no Organisations or person is given the right to divulge another person's right to a third party, ALL THESE VIOLATIONS ARE PUNISHABLE UNDER THE LAWS OF THE LAND.

4 0
3 years ago
Does anyone know the answer to this question??
Ket [755]
The type of letter they are looking for is an Inquiry Letter. 
An Inquiry letter asks questions or elicits info from the recipient. They would include what they are looking for or what they need to know about. They should include any info to reach back to them. 
6 0
3 years ago
Other questions:
  • Write the addReview method, which adds a single product review, represented by a ProductReview object, to the ReviewCollector ob
    14·1 answer
  • Rikki has had several problems at work recently. Her printer isn't printing correctly, copies from the copy machine come out wit
    8·2 answers
  • You have a site (Site1) that has about 20 users. For the last few months, users at Site1 have been complaining about the perform
    9·1 answer
  • . Briefly describe an SQL DML statement for changing existing data in a table.
    5·1 answer
  • Which of the following Google tools support collaboration? Docs Sheets Slides All of the Above
    13·1 answer
  • PLZ ANSWER ALL MY QUESTION. Which line of code will display the variable num rounded to the nearest tenth?
    14·1 answer
  • Write a test program that prompts the user to enter three sides of the triangle (make sure they define an actual triangle), a co
    5·1 answer
  • Old systems can be useful when designing new computer software.<br> True or False
    7·2 answers
  • A large global retail corporation has experienced a security breach, which includes personal data of employees and customers.
    5·1 answer
  • Which open-sourced packet capture tool uses linux and mac os x operating systems?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!