Which of the following are common problems experienced with software applications? (choose all that apply)faulty microprocessor

missing DLL files

installation issues

configuration issues

applications running slowly

kernel panic

power cords not being plugged in

Answers

Answer 1
Answer:

The common problems experienced with software applications will be missing DLL files, installation issues, configuration issues, applications running slowly, and kernel panic. Then the correct options are B, C, D, E, and F.

What are the common problems experienced with software applications?

Today's world depends heavily on technology. Technology now controls not just how businesses run but also how quickly many different sectors across the world are developing. The pace of technical development dictates the rate of development and company growth, leaving human progress and economic expansion at the whim of technology.

Some of the common problems are as follows:

  • Missing DLL files
  • Installation issues
  • Configuration issues
  • Applications running slowly
  • Kernel panic

The normal issues experienced with programming applications will be missing DLL documents, establishment issues, arrangement issues, applications running gradually, and part alarms. Then the right choices are B, C, D, E, and F.

More about the common problems with software applications link is given below.

brainly.com/question/29704760

#SPJ12

Answer 2
Answer:

Answer:

All but the top and bottom on edge 2020

Explanation:


Related Questions

What is the history of telecommunication​
What is the best for cleaning up scattered laser toner particles?a. Use a hair dryer to blow away the residueb. Use moist paper towels to wipe up particlesc. Use your shirt sleeve to make them disappeard. Use a vacuum cleaner equipped with a HEPA filter while wearing your PPE
In open addressing with linear probing we must consider how to encodeA. Occupies positionsB. Available positionsC. All other answersD.empty positions
5. convertToUpper - Given an input string, the function converts all alphabetic characters to uppercase. Write the new string into an output file called Upper.txt and return true. If the input string is empty just return false. The function header is: bool convertToUpper(const string & st)
Mai has recently created her own e-mail account. Her father gave her permission to e-mail her friends and family but warned her that it is dangerous to open e-mails from people she does not know. Mai did not understand why her father would give her this warning. Why did Mai’s father say it is dangerous to open e-mails from unknown senders? Check all that apply. The sender could be a hacker. The e-mail could be inappropriate. The e-mails usually contain jokes. The e-mail may belong to someone else The message may contain a virus.

Following a security assessment, the Chief Information Security Officer (CISO) is reviewing the results of the assessment and evaluating potential risk treatment strategies. As part of the CISO’s evaluation, a judgment of potential impact based on the identified risk is performed. To prioritize response actions, the CISO uses past experience to take into account the exposure factor as well as the external accessibility of the weakness identified. Which of the following is the CISO performing?A. Documentation of lessons learned
B. Quantitative risk assessment
C. Qualitative assessment of risk
D. Business impact scoring
E. Threat modeling

Answers

Answer:

The correct answer to the following question is option B). Quantitative risk assessment.

Explanation:

QRA ( Quantitative Risk assessment) is the objective risk  assessment tool that is used to project threat impacts.

Quantitative Risk Assessment provides the estimate of magnitude of the consequences for each of the identified budget threats.

It set out to measure, define, provide, and predict the confidence  level of the likelihood and the occurrence of the threat impacts.

A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered for the username: 0xbfff601a. Which of the following attacks may be occurring?(A) Buffer overflow attack
(B) Man-in-the-middle attack
(C) Smurf attack
(D) Format string attack
(E) Denial of service attack

Answers

Answer:D)Format string attack

Explanation:

Format string attack is the type of attack that causes to change the application functioning .This attack access the memory of the string library. It occurs while the submission of the string as input and then gets tested due to application command.

Other options are incorrect because these are the attacks that don't happens in the application for the alteration of the flow. Thus, the correct option is option(D).

What are the similarities and differences between the editor-in-chief, managing editor, assignment editor, and copyeditor? Your response should be at least 150 words.

Answers

Answer:

Editor. An editor is the individual in charge of a single publication. It is their responsibility to make sure that the publication performs to the best of its ability and in the context of competition. A managing editor performs a similar role, but with greater responsibility for the business of the publication.

Explanation:

. A file allocation table (FAT) is used to keep track of the portions assigned to a file. Select one: True False

Answers

Answer: True

Explanation: File allocation table(FAT) is the part of the file system that helps the hard drives .It is used for the management of the files and data which gets stored in the hard drive  by the operating system. It can also help in the extension or expansion of the hard drive storage.

It also keeps tracing the files and data accordingly. This table works for the  portable devices ,cameras etc. Thus, the statement given is true.

Which of the following is NOT a typical action of the catch block?Select one:
a. Throwing the exception
b. Completely handling the exception
c. Rethrowing the same exception for the calling environment
d. Partially processing of the exception

Answers

Answer:

A.

Explanation:

because its throwing the exception

Explain how signal detection theory can be used to analyze web site reading and searching. Based on this analysis, provide three suggestions for your favorite search engine or web site that includes search.

Answers

Answer:

Human visual behavior often includes searching, scanning, and monitoring.

While it should be possible to moderate the performance of these tasks based on the dimensions used in the table, it is often useful to analyze these situations using Signal Detection Theory (SDT).              

 

Three suggestions for my favourite search engine that includes search are:

1.  ensure that search results are graded according to the following categories using different colours:  

  • Most accurate and relevant results;
  • Accurate and slightly relevant results
  • Fairly accurate and fairly relevant results

These can help the users identify more easily the results to spend more time on. This categorisation can be done using colours. This is because of the way the eye functions. Unlike a camera snapshot, for example, the eye does not capture everything in a scene equally, but selectively picks out salient objects and features from the current context, and focuses on them so they can be processed in more detail.

2.  Another suggestion is that attention needs to be paid to where people look most of the time. It is not out of place for people to instinctively avoid search results that have dollar signs or currency signs especially when they are not searching for a commercial item.  

3. Lastly in displaying results that have images, it best to use sharp images. The theory suggests with respect to contrast, clarity and brightness that sharper and more distinct objects appear to be nearer, and duller objects appear to be farther away. To elicit the interest of the reader, targeted results or information from search engines must make use of the factors of contrast, clarity and brightness.

Cheers!