What does a black box represent in the system input/output model?.

Answers

Answer 1

Answer:

es un elemento que se estudia desde el punto de vista de las entradas que recibe y las salidas o respuestas que produce, sin tener en cuenta su funcionamiento interno.

Explanation:


Related Questions

Select the correct answer from each drop--down menu

Mike wants to prepare a project estimation and incorporate this in a SQA plan. which technique should mike use for this purpose?

Mike should use ______ to prepare a project estimation and incorporate this estimation in an SQA plan. This technique is part of SQA activity of applying _______ engineering.

1. interviews, testing, reviews
2. hardware, software, product

Answers

Mike should use Software quality assurance (SQA) technique.

Mike should use reviews to prepare a project estimation and incorporate this estimation in an SQA plan. This technique is part of SQA activity of applying software engineering.

Which is a SQA technique?

Software quality assurance (SQA) is known to be a type of method used to assures that all software engineering procedures, methods, or activities etc., are been monitored and work with the defined standards.

Note that these defined standards is one that has  one or a composition such as ISO 9000, etc.

Learn more about Software from

brainly.com/question/24930846

Answer:

i dont have the full answer but i do know for sure that

reviews is WRONG

2. software is RIGHT

Explanation:

platooo

100 points.
What is steganography? Do online research about a tool named Open Stego. Discuss the applications of this tool and explain how it can be used. Then, use Open Stego to encrypt and decrypt messages into pictures. Explain the steps you use to find the hidden messages.

Command line is the user interface in the computer’s operating system and is built into all computers. Do online research and describe how to perform steganography using the command line.

Answers

Steganography is the practice of hiding a secret message inside of (or even on top of) something that is not secret.

The attacker doesn’t need to trick the user into using applications such as Steghide. In this case, the hacker – or pen tester – is “living off the land.” The attacker is using a steganographic application to take advantage of common Windows applications and features such as Excel and PowerShell. All the victim needs to do is read the doc, and an unfortunate series of events begins to occur.

I can't do the Open Stego thingy bc I can't.

90 POINTS Hazel is working with a database to help determine if the company she works for is making or losing money. Hazel has organized the expenses category from the smallest expense to the largest expense. Which of the following database features has Hazel employed to organize the data?

A.
sorting

B.
filing

C.
nesting

D.
filtering

Answers

Answer:

a

Explanation:

Answer:

it's A  sorting sorry if it's wrong

Explanation:

What standard tcp port is reserved by iana for the openvpn service to operate on?

Answers

Answer:

1194 is the OpenVPN port reserved by the IANA

Explanation:

Network Security Fun. > Quizzes > Practice Exam (for midterm: m.

Practice Exam (for midterm: mods 1-7)

Started: Mar 11 at 2:07pm

Quiz Instructions

nts

Question 21

1 pts

Sean is an information security architect at a financial firm. As his first project, he must design and build an

efficient, sure-shot, yet cost-effective solution to Tetect and prevent bank credit card fraud. How should Sean

proceed?

O Design a solution that is confined to and hardcoded with a specific place and specific time. If the user

males transaction at a different place or time it will be considered an outlier and trigger an alert

Answers

Answer : Sean is an information security architect at a financial firm. As his first project, he must design and build an efficient, sure-shot, yet cost-effective solution to Detect and prevent bank credit card fraud. How should Sean proceed? O Design a solution that is confined to and hardcoded with a specific place and specific time.

Explanation: Sean is an information security architect at a financial firm. As his first project, he must design and build an efficient, sure-shot, yet cost-effective solution to Detect and prevent bank credit card fraud. How should Sean proceed? O Design a solution that is confined to and hardcoded with a specific place and specific time.

Question 2 of 10
A game has a function that requires the player sprite to first collect a banana
and then collect a coin, after which the game ends, and the player wins.
Which word is the Boolean operator that should be used in the program to
indicate this set of conditions?
A. Not
B. And
c. Or
D. After

Answers

Answer:

b

Explanation:

I really don't but I hope its correct

The word that is the Boolean operator that should be used in the program to indicate this set of conditions is And. The Option B.

Which Boolean operator should be used to indicate the specified conditions in the game?

The Boolean operator that should be used in the program to indicate the specified set of conditions, where the player sprite needs to collect a banana and then collect a coin to win the game, is "And."

The "And" operator evaluates to true only when both conditions are met simultaneously, meaning the player must satisfy both conditions of collecting the banana and the coin to trigger the game-winning outcome.

Read more about Boolean operator

brainly.com/question/3445425

#SPJ2

Fill in the blank by selecting the correct option. Ethical codes may not address because they are written quite broadly

Answers

Ethical codes may not address all of organization's ethics because they are written mostly by a task force committee of SHRM members and leaders.

What does codes of ethics address?

A code of ethics are known to have or contains some professional conduct outlines. They are regarded as ethical principles that helps to rule  or monitors decisions and behavior at a firm.

They are known to states the  general ways of how employees should behave in the office , as well as some other guidance for settling issues such as harassment, safety, etc.

Learn more about  Ethical codes  from

https://brainly.com/question/24606527

You took a picture of the beach, and there's a seagull sitting in the sand that you want to remove. What do you use to draw and AUTOMATICALLY remove the seagull, replacing it with more sand?

Answers

Answer: You can use a special type of editor to remove anything you want, and have that place filled in so its not blank space.

BUT: I am not sure of a specific one.

Similarities between Off-site and On-site

Answers

Answer:

As adjectives the difference between onsite and offsite

is that onsite is on or at a site while offsite is away from a main location; in a place not owned by a particular organisation.

Look at the color key below the map that shows the overall performance range. What is the range for 1 Year Performance? How does it compare to the 1 Day Performance range?

Answers

A performance range simply means the threshold and maximum percentage of shares that may become earned.

What is a performance range?

Your information is incomplete. Therefore, an overview will be given. A performance range is the maximum percentage if shares that may become earned shares due to the attainment of the requirements of the performance.

It should be noted that in this case, the opportunity to incentivize performance will be associated with the relative performance.

Learn more about performance on:

https://brainly.com/question/26256535

If a driver update creates a problem, you can __________________ the driver update if the previous drivers were working.

Answers

Answer:

rollback the driver update if the previous drivers were working

Which of these is most likely to contribute to the long term of a local ecosystem?

Answers

i would help but you didn’t say what these is

The choice of database does not have any impact on the relevancy of search results?

Answers

Answer:

When searching for articles using library databases, the following tips should increase the relevance of your results. Quotation marks around two or more keywords - phrase searching - ensures that the results will include the exact phrase.

Explanation:

The choice of database does impact the relevancy of search results as different databases have varying algorithms and criteria for determining relevance.

The choice of the database can indeed have an impact on the relevancy of search results.

Different databases have varying algorithms and search capabilities, which affect how they index and retrieve information.

Databases might prioritize different criteria for relevance.

Academic databases, for instance, may prioritize scholarly articles based on factors like peer review, citation count, and relevance to a specific field.

This ensures that users searching for academic resources find the most authoritative and credible information.

So, when choosing a database, it's important to consider its specific search algorithms and features to ensure you get the most relevant results for your needs.

To learn more about database visit:

https://brainly.com/question/6447559

#SPJ3

A team of computer science researchers develop a program for searching trees that can be run in parallel. When they use distributed computing techniques to run the program on six computers in parallel, they find a speedup of 3. In this case, what does a speedup of 3 indicate?

Answers

Answer:

The program completed in a third of the time with six computers versus one computer.

Explanation:

The speedup of a parallel solution is measured in the time it took to complete the task sequentially divided by the time it took to complete the task when done in parallel (or put succinctly, speedup = sequential/parallel).A speedup of 3 means that the program took three times as long on one computer, which is the same thing as saying it took a third of the time with all six computers working in parallel.

scientific name of computer ?

Answers

Answer:

supercomputer. (redirected from scientific computer)

Explanation:

hope it will help you..

Scientific name of computer supercomputer.

What are Supercomputer?

Supercomputing and other computing methods are sometimes used interchangeably. Yet, there are times when the synonyms aren't clear. To assist clarify some similarities and differences between various computer types, here are some common analogies.

While supercomputing typically refers to the process of complex and massive calculations used by supercomputers, high-performance computing (HPC) is the utilization of several supercomputers to execute difficult and huge computations.

Supercomputers are often known as parallel computers since they can perform parallel processing. Parallel processing is the simultaneous use of many Processors to solve a single calculation.

Therefore, Scientific name of computer supercomputer.

To learn more about Supercomputer, refer to the link:

https://brainly.com/question/30227199

#SPJ6

What can a company learn by studying website analytics for its website?.

Answers

Answer:

they can learn how people interact with it

Explanation:

Unit 6: Lesson 2 - Coding Activity 3 for projectstem. Org coding thing

Answers

Project Stem was founded as a 501(c)(3) non-profit corporation. Its goal is to help students get the confidence they need to participate, learn, and continue in the subject of computer science.

What is a Coding Activity?

A coding activity refers to activities that help the students learn to code. Some of the activities are designed as:

GamesPuzzles and Actual assignment.

Examples of coding activities could be:

To guide a Jupiter RoverTo create a pixel puzzle etc.

Learn more about Coding Activities are:
https://brainly.com/question/25250444

What are different social phenomenas are you aware of that used part of a social movement, change, or cause

Answers

Answer:

Social change in the broadest sense is any change in social relations. Viewed this way, social change is an ever-present phenomenon in any society.

Explanation:

A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what should the IT security department implement to prevent this type of mishandling of confidential information

Answers

Save the passwords to an encrypted database, saving the passwords as hash values to keep confidentiality.

If you were designing facial recognition software based on machine learning,
how would you avoid algorithmic bias?
O A. Make sure to avoid using any algorithms in the program
O B. Ask the programmers if they are biased against groups of people
O C. Use training images that show a diverse group of people
D. Use photos with people facing in all different directions

Answers

To avoid algorithmic bias, Ask the programmers if they are biased against groups of people.

How do you avoid an algorithm bias?

The right step is to avoid this kind of bias is to take a record of inventory of the algorithms. Note that Developers can communicate with stakeholders to know more about about how and when algorithms are being applied.

Once you have known the algorithms, then you can appoint a person to monitor the algorithms, mostly among wide groups.

Learn more about algorithm  from

https://brainly.com/question/24953880

When would a flag variable be most useful?
1.when printing the number of items in a list

2.when checking the condition of a variable in a while loop

3.inside a function that prints the largest side of a triangle

4.when initializing a list

Answers

2. When checking the condition of a variable in a while loop.

When preparing your taxes, what can possibly help
reduce the amount of taxes that you owe?
Stock and savings interest
Sharing what you earned on a W-2 or 1099 form
Having stock dividends
Credits and deductions

Answers

When preparing your taxes, what can help is Sharing what you earned on a W-2 or 1099 form.

What are some expenses that can be taken as a tax deduction?

Note that a  person's Office supplies, credit card processing fees, tax preparation fees, etc., are some expenses that are taken as tax deductions.

Conclusively, Taxes are some amount of money taken by the government from our income. By Sharing what you earned on a W-2 or 1099 form, one can know the amount you earn.

Learn more about taxes from

https://brainly.com/question/25783927

Answer:

When preparing your taxes, credits and deductions can possibly help reduce the amount of taxes that you owe.

Explanation:

How to transfer polygon from eth to polygon in ledger live

Answers

Import it to there and there it you go!

Select Bridge to Polygon from the three-dot option for Ethereum. Fill in the amount of ETH one want to bridge onto Polygon in the pop-up window.

What is polygon in ledger live?

Polygon is a Layer 2 solution that aims to fix all of Ethereum's major issues while also making crypto more accessible to the general public.

Popular blockchain networks, such as Ethereum, are overcrowded and costly to use.

Thus, by selecting the Bridge to Polygon from the three-dot option.

For further details about polygon in ledger live, click here:

https://brainly.com/question/14797470

#SPJ4

What is the name for the base-2 system used by computers to represent
data?
O A. Unicode
O B. Binary code
C. Hexadecimal code
D. Decimal code

Answers

Answer:

B. Binary Code

Explanation:

Binary code is the base-2 system used by computers to represent data. Binary code consists of 0's and 1's which can be used to represent states such as on or off; go or no-go and more.

How is the development of SaaS related to cloud computing?

Answers

Answer:

SaaS cloud allows it to take advantage of the efficiencies of resource pooling and cost effective pricing models of cloud- based infrastructure

P.W. Singer jokes about how many people are using Wang computers. What point is he making with this joke?

Answers

P.W Singer stated:

"And think about it this way: We don't use Wang computers anymore, or Commodore 64s, kids don't play Atari videogames. Those companies may have been at the forefront of the digital revolution, they're not anymore. Same thing in war. You know the British invent the tank. The Germans figure out how to use the tank better,"

Enjoy

Please have a great day <3

Which type of software-based attack tracks all of your browser activity and relays it to cybercriminals?.

Answers

Answer: Spyware

Hope that helps!

45 points!!!!!
One of the options for a software engineer is to work with the testing team of an SDLC project. In your view, state the pros and cons of placing a junior engineer with the testing team. Analyze it from both the company’s and employee’s points of view.

Answers

The pros and cons of placing a junior engineer with the testing team is that:.

The pros is that they get to learn.The cons is that one has to go back and try to explain things step by step which may slow down the project process.

What are the pros and cons of a software engineer?

The pros of a person as a software engineer are the fact that they gett paid well, they are often respected, and they have the freedom to work from home,

The cons or disadvantages is that they often feels stressed, overwork themselves and others.

Learn more about SDLC project from

https://brainly.com/question/26872062

What is one major reason various industries have adopted the use of automated robotic assembly?.

Answers

The major reason various industries have adopted the use of automated robotic assembly is to increase manufacturing productivity.

What is automated robotic assembly?

Automated robotic assembly is the use of automotive technology to operate different areas in the manufacturing industries.

Automated robotics are used to perform the following tasks:

welding, assembly,shipping, handling raw materials, andproduct packing.

The reason why various industries have adopted the use of automated robotic assembly is that it saves time and there is increase in the amount of products manufactured that when manually handled.

Learn more about automation here:

https://brainly.com/question/11211656

Pls help xD. In pseudocode or python code please. Will mark best answer brainliest. Thx

Answers

Answer:

I'm doing my best to send you my answer,

Explanation:

The coding will be below

Other Questions
missouri applies for statehood as a slave state. describe the missouri compromise and define north/south positions what is the result of ocean acidification Which equation can be used to calculate the surface area of the triangular prism net show below? The net of a rectangular prism. The rectangular sides are 10 centimeters by 13 centimeters, 10 centimeters by 12 centimeters, and 10 centimeters by 5 centimeters. The triangular sides have a base of 5 centimeters and height of 12 centimeters. [Not drawn to scale] Surface Area = (one-half) (5) (12) (5) (10) (12) (10) (13) (10) Surface Area = (one-half) (5) (13) (one-half) (5) (13) (13) (10) (12) (10) Surface Area = (2) (5) (13) (5) (10) (13) (10) (12) (10) Surface Area = (one-half) (5) (12) (one-half) (5) (12) (5) (10) (12) (10) (13) (10). Which statement(s) most directly apply to capitalism? i. there is heavy government regulation of industry. ii. individuals can start some, but not all, kinds of enterprises. iii. the price and availability of goods is determined primarily by the market. a. i and ii b. ii only c. i and iii d. iii only Question 3Which type of carbon is used in carbon dating?C-14C-13C-12C-11 What influenced Nixon's shift of U.S. foreign policy from containment to dtente? use prime factorisation to find the hcf of 612 and 1314 AP World History Create a multimedia presentation that effectively responds to a prompt and analyzes continuities and changes over time. From 1200 to the present, religions and belief systems have shaped and been shaped by societies and states in a multitude of ways. Develop an argument that evaluates the continuities and changes in the ways that religions and belief systems have both supported and challenged societal and political standards. Be sure to address each of the following regions: Africa, the Americas, Asia, Europe, and Oceania please anyone who knows define what is physics Directions: Follow the instructions in each problem set below to complete the activity.Part AClassify each noun as concrete, abstract, or collective.1. Humor2. Kindness3. Army4. Danger5. Committee6. Towel7. Jury8. Audience9. Bird10.Orchestra The ratio of the diameter of a larger circle to the diameter of a smaller circle is 3/2. What ratio represents the ratio of the area of the larger circle to the area of the smaller circle? An article on health impact due to water pollution There are many factors that contribute towards one's personal values and views toward nature. based on the information from this lesson, identify one or two factor(s) important to your own views on nature and natural landscapes. Steve claims tan(x) - 3What value of cos(x) supports Steve's claim?941094040414140 How has U.S. dependence on foreign oil affected foreign policy? Please help me quick Im so confused oml Use the points of the cell theory to say why humans and bacteria are similar. What is the area of this trapezoid? units 2 Nine lifestyle diseases caused by substance abuse