1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
9

Explain the term software dependability. Give at least two real-world examples which further elaborates

Computers and Technology
1 answer:
Elena L [17]3 years ago
3 0

Answer:

Explanation:In software engineering, dependability is the ability to provide services that can defensibly be trusted within a time-period. This may also encompass mechanisms designed to increase and maintain the dependability of a system or software.Computer software is typically classified into two major types of programs: system software and application software.

You might be interested in
Match the components of a blog to their descriptions.
motikmotik

Answer:

Explanation:

1. entry title - name of the posting

2. permalink - place where a blog posting is located

3. entry date - when the posting became available

4. comment - allows users to add to the conversation

3 0
3 years ago
2. Voltage is:
jenyasd209 [6]
A. The force that moves electrons
6 0
3 years ago
____ privileges for data involve establishing who can enter new data, change existing data, delete unwanted data, and view data.
Stolb23 [73]
Administrator privileges
6 0
3 years ago
Consider the following code segment:
horrorfan [7]

Answer:

13333333333333333333333fv mvfdmv mfv fmv f mf vmf f vfmvnfmvnmnvmfnvmnvmnv3Explanation:

6 0
3 years ago
What specialized computer program hides the differences in hardware and works a bridge between hardware and appilcations?
VLD [36.1K]

A. hope this helped.

3 0
4 years ago
Other questions:
  • Why ues storage unit?​
    12·1 answer
  • Because public key encryption requires the use of two different keys, it is also known as _____ encryption
    13·1 answer
  • When a user stores data in "the cloud", the data is stored on the user's premise in what is called a "cloud server"?
    6·1 answer
  • Suppose the length of each packet is L bits. Also, assume the path from a server to a client includes N links each of rate R (i.
    8·1 answer
  • Below is the prototype for a function that takes two pointers to integer variables as its parameters. The purpose of the functio
    14·1 answer
  • In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of
    14·1 answer
  • The ability to send and receive transmissions at the same time on an ethernet cable is referred to by what term?
    7·1 answer
  • HI brainly friends....<br> Pease thanks my answers I will also thank your answers
    11·1 answer
  • How many passes will it take to find the five in this list?
    14·2 answers
  • You have double-clicked a device in Device Manager to open its Properties window. Where can you find information about IRQs the
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!