1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vfiekz [6]
2 years ago
14

I need help ASAP please and thank you!

Computers and Technology
1 answer:
hram777 [196]2 years ago
7 0

Answer:

B) Sees failure as a way to get better.

Explanation:

Someone with a growth mindset sees failure as a way to get better. A growth mindset is one that typically do not see failure as a stunning block but rather as a way to get better and excel.

You might be interested in
Many large IT departments use a(n) _____ team that reviews and tests all applications and systems changes to verify specificatio
mafiozo [28]

Answer:

Quality assurance team

Explanation:

Software development life cycle (SDLC) is a process or stages of processes a software application must go through to be materialized. The stages of SDLC are planning, design, implementation or development, testing or verification, deployment and maintenance.

An implemented software design must be tested. It is tested based on the pre-dertermined design and the quality standard of the company. A group of test expect are approached for this purpose, they are called the quality assurance team

They are equipped with skills to use third party applications to analyze and verify the quality of the developed software.

6 0
2 years ago
What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?
alisha [4.7K]

Answer:

Detection vs Prevention

Explanation:

  • A Network Intrusion Detection System as the name suggests it "detects" the attackers / vulnerabilities existed in the network system / infrastructure.
  • A Network Intrusion Prevention Detection System as the name suggests it "prevents" the attackers from hacking the system. While a detection just detects the abnormalities where as a prevention system can prevent them.
  • The detection system detects the vulnerabilities, security threats and the attackers in the system through the web traffic analyzers and security analyzers.
  • The prevention system prevents the network from being compromised. It tries to regain the access if already compromised.
  • Both the NIDS and NIPS have to be coordinated for the full protection of the network.
8 0
2 years ago
As we move up a energy pyrimad the amount of a energy avaliable to each level of consumers
AleksandrR [38]

Explanation:

As it progresses high around an atmosphere, the amount of power through each tropic stage reduces. Little enough as 10% including its power is passed towards the next layer at every primary producers; the remainder is essentially wasted as heat by physiological activities.

8 0
3 years ago
How many 1000-Watt lights can be plugged into a standard 120-Volt, 15-Amp outlet? (Hint: W/V=A) *
Licemer1 [7]

Answer:

There are up to 12 lights and or plugs on that circuit. A 1000w HPS or Metal Halide light takes 9 amps at 120 volts so you can only run one on a wall outlet circuit. A standard dryer outlet is 220 volts and 30 amps so you can power up to six 1000 watt lights on that circuit.

5 0
3 years ago
What is big data<br>please explain why it is called big and do the data necessarily mean numbers​
harkovskaia [24]

<u>Answer:</u>

<em>Big data is to analyze large complex data.</em>

<u>Explanation:</u>

It is basically a data processing software which has overcome the disadvantage which we had in <em>the classical software where it was not able to manage huge data in a faster mode.</em>

The mean of an informational collection is found by including all numbers in the informational index and afterwards partitioning by the number of qualities in the set.

<em>To answer the question is the word big points to a number? I would say yes, since it can handle large amount of data, it is so called “Big data.</em>

The middle is the center worth when an informational collection is requested from least to most noteworthy. <em>The mode is the number that happens frequently in an informational index.</em>

6 0
3 years ago
Other questions:
  • Home communication involves controlling systems such as heating, cooling, and security.
    11·1 answer
  • Which two climates have moderate rainfall and experience warm summers and cold winters due to their position relative to mountai
    6·1 answer
  • Which of these is a requirement for developing game applications on devices running Apple’s iOS operating system?
    6·2 answers
  • The incandescent test lamp is used to check for the presence of
    6·1 answer
  • What are 2 main differences betweenarrays andstructs?
    7·1 answer
  • Write a program that administers and grades quizzes. A quiz consists of questions. There are four types of questions: text quest
    13·1 answer
  • You receive an email that appears to legitimately be from your Bank. The email indicates the need for verification of your infor
    15·2 answers
  • Different search engines available on the internet​
    7·1 answer
  • ⚠VERY IMPORTANT MESSAGE⚠
    7·2 answers
  • Q2: Mark True or False in the corresponding Answer sheet (0.5 point each)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!