1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saw5 [17]
3 years ago
15

A computer has three main modules that have individual reliabilities of 0.77, 0.94, and 0.81. Because of recent failures, manage

ment is now considering adding redundancy. Determine the reliability of the system if each module has a backup with a reliability equal to its own and a backup switch with a reliability of 1.00
Computers and Technology
1 answer:
Artemon [7]3 years ago
6 0
Yo también necesito ayuda con esto:(
You might be interested in
Can someone reply me
Georgia [21]
Yes how can i help you?
4 0
2 years ago
How do I modify objects in power point 2016 for an assignment
ivolga24 [154]

Answer:

PowerPoint gives you pretty good editing control over shapes you insert into a presentation. ...

Once you've selected your shape, you'll notice a new “Shape Format” tab appear. ...

Advertisement. ...

A drop-down menu will appear. ...

Now, to change the shape, click and drag the black edit points to the desired location.

3 0
3 years ago
In a black box model are the customers told that they should be expecting to be haxked?
Licemer1 [7]
Uhhhhhhhhhhh maybe tbh i have noooo idea.
6 0
3 years ago
__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a maliciou
True [87]

According to security evaluation, <u>Penetration testing</u> is a level beyond vulnerability testing, a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).

Penetration testing is often considered or described as ethical hacking. It involves the process of securing a firm or organization's cyber defenses.

The process of penetration testing or security testing includes assessing for exploitable vulnerabilities in networks, web apps, and user security.

Hence, in this case, it is concluded that the correct answer is <u>Penetration testing.</u>

Learn more about <u>penetration testing</u> here: brainly.com/question/13137421

6 0
3 years ago
Does anyone take bca on plato
SVETLANKA909090 [29]
I do. do you need help with it?
7 0
3 years ago
Other questions:
  • Default tab stops are set in Word every _______ inch.<br> a. ¾<br> b. 1<br> c. ½<br> d. ¼
    13·1 answer
  • Select the correct answer.
    5·1 answer
  • What are some characteristics of filtering junk email in Outlook 2016? Check all that apply.
    10·2 answers
  • What is a benefit of the rise in citizen journalism? Multiple answer choice below
    13·1 answer
  • One of the functions of an IDE is to check for: flowchart errors. Syntax errors. memory errors X input and output.​
    12·2 answers
  • What font family is Times New Roman an what font family is Arial?
    9·2 answers
  • Write a SELECT statement that returns one row for each musician that has orders with these columns:
    13·1 answer
  • A bank wants to reject erroneous account numbers to avoid invalid input. Management of the bank was told that there is a method
    8·1 answer
  • Which of the following are true about algorithms? (You may select more than one)
    12·1 answer
  • Which web-authoring software enables users to create sophisticated web pages without knowing any html code?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!