1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bonufazy [111]
3 years ago
8

In addition to benchmark testing, performance measurements, called _____, can monitor the number of transactions processed in a

given time period, the number of records accessed, and the volume of online data.
Computers and Technology
1 answer:
Shalnov [3]3 years ago
3 0

Answer:

metrics

Explanation:

Given that Metrics is Metrics is an accepted technique of measuring quantities of elements or commodities.

It is used in all facets of human activities particularly in value measurement such as production operation, financial assessment, comparison purposes, etc.

Hence, In addition to benchmark testing, performance measurements, called METRICS, can monitor the number of transactions processed in a given period, the number of records accessed, and the volume of online data.

You might be interested in
5 band resistor with two red bands, two gold bands, one purple band?
Mamont248 [21]

According to below picture, two gold bands on a 5 band resistor cannot happen. What is the order of the bands?

8 0
3 years ago
Can my cell phone provider keep track of my internet history?
dem82 [27]
Are they allowed to? No
Could they? Possibly
Hotel? Trivago
8 0
4 years ago
rocess inputs using the following 1) Write a function that inputs numerical digits in the range of an unsigned short. 2) Write a
yawa3891 [41]

Answer:

 /* sizeof.c—Program to tell the size of the C variable */

 /*      type in bytes */

 

 #include <stdio.h>

 

   int main(void)

  {

  printf( "\nA char   is %d bytes", sizeof( char ));

  printf( "\nAn int   is %d bytes", sizeof( int ));

  printf( "\nA short   is %d bytes", sizeof( short ));

  printf( "\nA long   is %d bytes", sizeof( long ));

  printf( "\nA long long is %d bytes\n", sizeof( long long));

  printf( "\nAn unsigned char is %d bytes", sizeof( unsigned char ));

  printf( "\nAn unsigned int  is %d bytes", sizeof( unsigned int ));

  printf( "\nAn unsigned short is %d bytes", sizeof( unsigned short ));

  printf( "\nAn unsigned long is %d bytes", sizeof( unsigned long ));

  printf( "\nAn unsigned long long is %d bytes\n",

   sizeof( unsigned long long));

 printf( "\nA float   is %d bytes", sizeof( float ));

 printf( "\nA double  is %d bytes\n", sizeof( double ));

 printf( "\nA long double is %d bytes\n", sizeof( long double ));

return 0;

 }

2. #include<stdio.h>

int main(){

  int num,reverse_number;

  //User would input the number

  printf("\nEnter any number:");

  scanf("%d",&num);

  //Calling user defined function to perform reverse

  reverse_number=reverse_function(num);

  printf("\nAfter reverse the no is :%d",reverse_number);

  return 0;

}

int sum=0,rem;

reverse_function(int num){

  if(num){

     rem=num%10;

     sum=sum*10+rem;

     reverse_function(num/10);

  }

  else

     return sum;

  return sum;

}

3.  

#include <bits/stdc++.h>  

 

using namespace std;  

/* Iterative function to reverse digits of num*/

int reversDigits(int num)  

{  

   int rev_num = 0;  

   while(num > 0)  

   {  

       rev_num = rev_num*10 + num%10;  

       num = num/10;  

   }  

   return rev_num;  

}  

 

/*Driver program to test reversDigits*/

int main()  

{  

   int num = 4562;  

   cout << "Reverse of no. is "

        << reversDigits(num);  

   getchar();  

   return 0;

4 0
3 years ago
Question 5 (2 points)
Scrat [10]

Answer:

B) 5 m/s

Explanation:

Took the test and this was the correct answer :)

6 0
3 years ago
What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations?
noname [10]

Answer:

Malware, short for malicious software, consists of programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices

Explanation:

7 0
3 years ago
Other questions:
  • The index finger on your right hand types the _____.
    11·1 answer
  • CAPTCHAs can be used as a form of signature to create a valid contract in e-commerce. True False
    6·2 answers
  • PLEASE HELP! Which aspect helps you to change the luminescence of your image?
    10·2 answers
  • A special symbol that is used as an underlining structure to an agenda
    5·1 answer
  • File Sales.java contains a Java program that prompts for and reads in the sales for each of 5 salespeople in a company. It then
    8·1 answer
  • Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times
    6·1 answer
  • John Cleaver is the CEO of Tech World, which is a retail store that sells computers, monitors, cameras, televisions and many oth
    6·1 answer
  • Which of the following statements is true?A)Implicit data type conversion is performed when you mix values of different data typ
    5·1 answer
  • Examine the following piece of code and determine the data type of the function's return value.
    11·1 answer
  • is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!