1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elanso [62]
3 years ago
9

What is modularity?

Computers and Technology
1 answer:
My name is Ann [436]3 years ago
8 0

Answer:

Option D

Explanation:

Modularity in general defines the flexibility of a system. It is the degree to which a system can be broken down into smaller segments and then rearranged or recombines into new groups. Modularity is determined for multiple disciplines each having their own drawbacks.

You might be interested in
Explain why the computer is powerful working tool???​
notsponge [240]

Answer:

here ya go

Explanation:

A computer is a powerful tool because it is able to perform the information processing cycle operations (input, process, output, and storage) with amazing speed, reliability, and accuracy; store huge amounts of data and information; and communicate with other computers.

8 0
3 years ago
A self improvement plan should begin with planning how you will accomplish your goal.
Artist 52 [7]

Answer:

True

Explanation: The first step is to make a goal. The second step is to plan how you will accomplish you goal. The third and final step is to accomplish your goal.

4 0
3 years ago
Read 2 more answers
Briefly explain the importance of doing backup in systems administration and explain in detail any three methods for performing
Dmitry_Shevchenko [17]

Answer:

Importance of backup in system administration:

Backups are crucial in system administrations for preserving continuity and protecting against specific types of hardware failures, service interruptions, and human mistakes. To aid a company in recovering from an unexpected catastrophe, backup copies make it possible to restore data to a previous point in time. To safeguard against primary data loss or corruption, it is essential to save a copies of data on a different media. When a system administrator create a backup, he makes a copy of the data that you can restore if your main data is lost. These errors may be the consequence of faulty hardware or software, corrupted data, or a human error like a targeted attack or an unintentional deletion. System backup and recovery is therefore a crucial skill for system administrators as well as the companies they work for.

Three methods for performing backup:

  1. Disk image: A efficient method to back up not only the files and directories but also everything else on the system is by creating a disk image. If a user have a disk image, the user can restore everything, including the operating system, applications, data, and more, so the user won't have to worry about any difficulties. Placing the  disk image-containing DVD into the DVD-ROM to restore the backup. Additionally, just attach an external HDD to the computer if the user have a disk image that they made.
  2. External hard drive: The most common backup method is to use an external hard drive or even a USB flash drive. An HDD can be easily, quickly, and affordably backed up. It is effective since consumers may carry their portable backup with them wherever they go.
  3. Cloud backup: Cloud backup or Online backup has been around for a while, but not many people really utilize it. But the greatest backup technique by far is cloud backup. The user does not have to worry about hardware problems because their files are saved in the cloud and can be accessed from anywhere because the backups are automatically produced and everything is synchronized. It is one of the greatest methods to backup, especially when you consider that the contents are encrypted and stored securely.

6 0
2 years ago
Need Help! Asap 7.5 code practice (Edhesive)
erma4kov [3.2K]

Answer:

Make main function

def main():

Make some constants for the grades

A = 5.0 or 4.0

B = 4.0 or 3.0

C = 3.0 or 2.0

D = 2.0 or 1.0

F = 1.0 or 0.0

In the main function call the function you made and make sure to use those constants for help

also don't forget to call your main function or nothing will work

Explanation:

Making the main function is good programming practice for your future

Making the constants is also helpful to your programming.

Now how it works you call the function you wrote to calculate the grade.

I don't know how helpful this was this is one of my first answers. I am `also answering how I would do it

5 0
3 years ago
Read 2 more answers
An end user has reported not receiving emails sent by a specific customer. Which of the following is the MOST likely cause of th
dedylja [7]

An end user has reported not receiving emails sent by a specific customer. The main reason for this is The email filter has quarantined the messages

<u>Explanation:</u>

A location on the server the emails that are considered as spam gets stored. These are stored in this location only on a temporary basis. They can be retrieved whenever necessary.  The System administrator has the authority to check the emails that are suspected to be spam on behalf of the user.

Using End User Digest any user can find those emails that are quarantined and can take necessary actions on these emails. The emails are stored in this location only for a certain period of time. If the time is exceed then those mails will be deleted automatically

5 0
3 years ago
Other questions:
  • "what do you perform when you want to recall specific records from a database"
    13·1 answer
  • The ____ aggregate function finds the largest value
    10·1 answer
  • Type 1 hypervisor:
    10·1 answer
  • How do you change your name on brainly after you have made an account​
    5·1 answer
  • Maya is preparing a presentation for her science class on how solar panels produce energy. Why would a
    11·2 answers
  • The photo shows a group of girls reacting to comments they have read about a classmate on a social media site.
    10·1 answer
  • Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Referenc
    7·1 answer
  • Why would over-50 executives have a harder time buying into the idea of social media?​
    15·1 answer
  • Which of the following terms refers to the cells that contain values and labels to be graphed in the chart?.
    6·1 answer
  • Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It s
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!