1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hodyreva [135]
3 years ago
15

What is a key consideration when evaluating platforms?

Computers and Technology
1 answer:
kotegsom [21]3 years ago
7 0

Answer:

The continuous performance of reliability data integrity will lead to the benefit and profit of the platform's regular structure changes. Cleanliness in the platform whereas addresses the straightforward structure of task performance and adequate data integrity.

You might be interested in
Choices.
Svet_ta [14]

Answer:

1. B

2. D

3. C

4. A

5. B

Explanation:

1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."

2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.

3. Virus is a software program that can infect, damage and disrupts the whole computer system.

4. To protect the whole computer system, the software utility which is needed is an Anti-virus.

5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.

7 0
2 years ago
A string that contains only 0s,1s, and 2s is called a ternary string. How many strings of 10 ternary digits (0, 1, or 2) are the
alexdok [17]

Answer:

Number of strings = (10, 2)×(8,3) = 2520

Explanation:

The number of possible combinations for taking two 0's is C(10, 2)

It remains 8 Positions

The number of possible combinations for taking three 1's is C(8,3)

So there remains 5 spots

8 0
3 years ago
Read 2 more answers
The best way to share criticism is to ______. a. write it in the break room b. talk it about with all your coworkers c. talk abo
ICE Princess25 [194]

Answer:

C.

Explanation:

6 0
3 years ago
Read 2 more answers
Which of the following is not true of hardware VPNs?A) should be the first choice for fast-growing networks.B) can handle more t
vfiekz [6]

Answer:

C) have more security vulnerabilities than software

Explanation:

Hardware VPN is a computer term that described a separate tool that serves the functions of a virtual private network. It has its own component and an internal processing unit.

However, some of the characteristics of Hardware VPN is the following:

1. It is expensive compared to software VPN

2. It is generally faster

3. It requires more than a beginner to handle

4. With an in-built firewall, it is generally more secure compared to a software VPN.

Hence, in this case, the correct answer is option C.

3 0
3 years ago
List three functions that you can perform with a database that you cannot perform with a spreadsheet.
Delicious77 [7]
There are some function which can be performed with database but not with a spread sheet, these functions include: 
1. Enforcement of data type.
2. Support for self documentation.
3. Defining the relationship among constraints in order to ensure consistency of data.
5 0
3 years ago
Other questions:
  • A program that contains the following method: public static void display(int arg1, double arg2, char arg3) { System.out.println(
    15·1 answer
  • Write a Python program calculate summary statistics about a class assignment. First, prompt the user for the number scores to be
    6·1 answer
  • Shelly tells a friend that her computer needs to be fixed because it has been producing a lot of heat and is smoking. Where is t
    10·1 answer
  • Assume that you are testing the Orders database introduced in Watt (2014) - Appendix C. Discuss the problems and possible conseq
    12·1 answer
  • Expain the application areas of ICT in education sector and E-commerce​
    12·1 answer
  • 4.2 lesson practice help plzs
    6·1 answer
  • Is Naab a system of an accounting system? A factory operations system? or both? explain your answer
    12·1 answer
  • 4. When working at the CLI in Linux, you specify the exact location of a file, which is the ____________________ to it, by begin
    13·1 answer
  • What feature preserves your open apps and data, but allows another user to log in to his or her own session of the same computer
    7·1 answer
  • In a relational database application, a(n) ________ key is used to link one table with another.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!