1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tamiku [17]
3 years ago
6

Data sets can be described as instances when the software didn't work as expected.

Computers and Technology
1 answer:
lozanna [386]3 years ago
5 0

Answer:

True.

Explanation:

This is true because that can mean the same thing.

You might be interested in
Is cloud computing a hardware service used to keep computers working? True or False
sesenic [268]
False, cloud computing utilizes the internet for accessing resources. These resources include tools and applications like data storage, servers, databases, networking, and software.
6 0
3 years ago
Pick the two statements about packets and routing on the Internet which are true. a. Packets travelling across the Internet take
Cloud [144]

Answer:

B. TCP ensures messages can be reliably transmitted across the Internet.

D. TCP must account for the fact that packets may not arrive at a destination computer in the intended order

Explanation:

TCP or transmission control protocol is a connection oriented protocol that divides a packet to segments, and reliably sends them to their destination.

TCP is a layer 4 (transport layer) protocol in the OSI network model. Its packets data unit, PDU, is called segment.

For TCP connection to be successful, a three way handshake must be established between the client and server.

When a connection is established, tcp sends the packets in sequenced segments to the destination through various routes, the source receives acknowledgement for segments received by the destination and the source resend segment that were lost. In the destination, the TCP arranges the segments to its proper sequence.

8 0
3 years ago
a hacker who plants a rogue wireless access point on a network in order to sniff the traffic on the wired network from outside t
charle [14.2K]

Answer: a)Physical access

Explanation: Physical access is the function that permits the accessing of the  computer system in a physical way. This access work on the building, It organization and other physical buildings.This access make the system prone to high amount of corruption and hacking .

Other options are incorrect because technical access is for the accessing the technical parts,operational access is for controlling the functions and remote access is for accessing the system from remote area.Thus the correct option is option (a).

6 0
3 years ago
Define a method named swapValues that takes an array of four integers as a parameter, swaps array elements at indices 0 and 1, a
Luba_88 [7]

The program is an illustration of arrays.

Arrays are used to hold multiple values.

The program in java, where comments are used to explain each line is as follows:

import java.util.*;

public class Main{

   //This defines the method

public static int[] swapValues(int[] arr) {

   //This swaps the first and second array elements

       int temp = arr[0];

       arr[0] = arr[1];   arr[1] = temp;

   //This swaps the third and fourth array elements

       temp = arr[2];

       arr[2] = arr[3];   arr[3] = temp;

   //This returns the swapped array to main

       return arr;

}

//The main method begins here

   public static void main(String[] args) {

       //This creates a Scanner object

       Scanner input = new Scanner(System.in);

 //This declares an array of 4 elements

 int[] intArray = new int[4];

 //This gets input for the array

 for(int i = 0; i<4;i++){

     intArray[i] = input.nextInt();

 }

 //This calls the swapValues method

 intArray=swapValues(intArray);

 //This prints the swapped array

 for (int i = 0; i < 4; i++){

 System.out.print( intArray[i]+ " ");     }

}  

}

At the end of the program, the elements are swapped and printed.

Read more about similar programs at:

brainly.com/question/14017034

6 0
3 years ago
Care sunt avantajele fișierelor de tip ".pdf" ?
Alex787 [66]

Answer:

english i speak .

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • "Suppose there is a class Alarm. Alarm has two class variables, code which contains a String value representing the code that de
    10·1 answer
  • On what basis can you categorize the generations of computers
    7·1 answer
  • A motherboard has four DIMM slots; three slots are gray and the fourth is black. What type of memory is this board designed to u
    6·1 answer
  • What age group is experiencing the most growth in social media
    13·1 answer
  • Who knows coding questions? Please help! Thanks.
    6·1 answer
  • RIGHT ANSWER GETS BRAINLEST
    5·1 answer
  • What is a trojan horse in computer science?
    15·1 answer
  • Difine Mainframe Computer~<br><br><br><br><br><br><br><img src="https://tex.z-dn.net/?f=%20%5C%3A%20%20%5C%3A%20" id="TexFormula
    12·2 answers
  • Databases containing the research, writing and studies conducted by Academic
    14·1 answer
  • Which of the following commands can be used to display socket information out to the terminal screen
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!