1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astra-53 [7]
3 years ago
9

Describe, with examples, the way in which a defect in software can cause harm to a person, to the environment, or to a company

Computers and Technology
1 answer:
Arisa [49]3 years ago
4 0

Answer:

Losing jobs. Fire. Destruction of property.

Explanation:

Having a company shut down due to lack of protection and having people testify products unsafe. If software blows up it could cause desturction of property therefore causing the effect of many people losing their jobs.

You might be interested in
Given: int[][] values = new int[4][5] Using the statement above, write a nested loop to set values as follows: (3 pts) [0] [1] [
marshall27 [118]

Answer:

The question is a bit unclear. Are you asking how to add these values in this 2D array?

Explanation:

8 0
3 years ago
The processor itself is not a resource, therefore the OS is not involved in deciding how much of the processor time is used for
photoshop1234 [79]

Answer:

False

Explanation:

In computing, a resource can be defined as a component with limited or varying size/capability. Every computer has a processor whose capability is measured by the number of instructions it can perform in a given unit of time (Clock speed), The number of cores, the size of cache memory and of course the make i.e. AMD or Intel.

One of the functions of the Operating systems in relation to CPU is CPU Scheduling. This is whereby the process manager determines the process to be allocated the resource (CPU) basing on the suitable criteria.

The scheduling criteria is based on:

a. CPU Utilization ensures that the CPU is busy all the time.

b. Throughput is the number of processes that can be executed per unit given time.  

c. Turn Around Time which is the time it takes to get the final output after the process has been allocated the CPU.

d. Waiting Time defined as the length of time a process takes in the ready queue.

e. Response Time defined as the difference in time between the arrival time and the time it starts executing.

The algorithms selected aims at:

1. Maximize CPU utilization

2. Maximize throughput

3. Minimize Turn Around Time, Waiting Time and Response Time

The operating system uses the scheduling criteria to determine the best algorithm to be used to give a number of processes.

These algorithms can be grouped as either preemptive or non-preemptive.

Preemptive means once the process has been allocated to the CPU and can be interrupted before it completes its burst time. Examples include:

a. Round Robin

b. Shortest Remaining Time First (SRTF)

c. Priority Scheduling

Non-preemptive scheduling algorithm works in a way that once a process has been allocated the CPU it cannot be halted or paused until it has completed its burst time. Examples include:

a. First Come First Serve (FCFS)

b. Shortest Job First (SJF)

c. Priority Scheduling

7 0
3 years ago
Read 2 more answers
Which function of InfoSec management encompasses security personnel as well as aspects of the SETA program?
inessss [21]

Answer:

People

Explanation:

Information security management provides a description of the controls needed by an organization in order to ensure that it is capable of protecting the integrity, availability, and confidentiality of assets from security vulnerability and threats. On the other hand, the SETA program is three phased and ensures that organizations address and implement training and techniques for information security. Hence the only function that encompasses security personnel as well as aspects of the SETA program is the People function.

8 0
4 years ago
the process of adjusting an IDPS to maximize its efficiency in detecting true positives, while minimizing both false positives a
Dafna1 [17]

Answer:

Tuning. See explanation below.

Explanation:

Tuning

By definition the tuning is: "the process of adjusting an IDPS to maximize its efficiency in detecting true positives, while minimizing both false positives and false negatives."

And this process is the improvement of system performance in computer science. Usually is related to optimization of a process, when we us tunning, we can follow these steps:

a) Identify which numeric values are acceptable and improve the parameters

b) Take a measure for the system originally and without the tunning in order to have an initial comparative measure

c) Understand that each process have a critical path, we need to identify it.

d) Modify parts who not improve the efficiency of the algorithm

e) Check the performace when we apply modifications

5 0
4 years ago
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
kolbaska11 [484]
The answer would be a network

7 0
3 years ago
Other questions:
  • Witch word in the sentence is a noun? the food he is cooking smells delicious.
    7·1 answer
  • Kindly answer in Just 7,8 lines please
    7·1 answer
  • A + B (AC (B +C’) D) = A + BD
    10·2 answers
  • Why are audio files compressed?
    12·1 answer
  • Were so deleted files go
    15·1 answer
  • Which testing is an example of non-functional testing? A. testing a module B. testing integration of three modules C. testing a
    13·1 answer
  • 1. As part of your community, your school, and your neighbourhood, how else does ICT have an impact on social
    11·1 answer
  • Select all steps in the list below that should be completed when using the problem-solving process discussed in this chapter.
    14·1 answer
  • Complete the procedure for creating a contact group by selecting the correct term from each drop-down menu. 1. Click . 2. Enter
    11·1 answer
  • Imagine that your parents were starting a small business, and they wanted to upgrade their data storage. Would you recommend a f
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!