Legacy systems can be described as all of the following except? Usually found on a mainframe. Old systems that often require hard-to-use command languages. Systems that most often have detailed information that can be accessed by a system at a higher tier. A system that often holds the middle tier of a multiple-tier system. A system that is already in place, from the past.

Answers

Answer 1

A legacy system refers to outdated infrastructure, applications, and processes, "a system that often holds the middle tier of a multiple-tier system" is not a characteristic of this system.

What is a legacy system?

It describes software or IT systems that have been around for a long time and that, from a technological point of view, should be replaced by a more modern version.

A legacy system has often been used for a long time and is no longer technologically up to date, however these old applications are still used for various reasons, for example because they form the basis of newer software.

Therefore, we can conclude that legacy systems are those computer systems that have become outdated but are still used by companies, "a system that often holds the middle tier of a multiple-tier system" is not a characteristic of this system.

Learn more about legacy systems here: https://brainly.com/question/7494597


Related Questions

The ________ loop is a good choice when you do not want the loop to iterate if the condition is FALSE in the beginning.

Answers

Answer:

while

Explanation:

The while loop is a good choice when you do not want the loop to iterate if the condition is FALSE in the beginning.

You are implementing security at a local high school that is concerned with students accessing inappropriate material on the internet from the library's computers. The students use the computers to search the internet for research paper content. The school budget is limited. Which content filtering option would you choose?

Answers

Answer:

I would use a manually created blacklist.

Filters like those found in Internet Explorer and Netscape can help users block out objectionable or obscene material. In this situation, I could add my own web addresses to the list of blocked sites.

Another method of filtering would be to install hardware-based filters that look for certain keywords in a user's browsing history and flag that information as unacceptable. This would give me more control over what is blocked, but again would not allow me to personally review each page flagged by the filter before it became available to students.

I would go with a manual blacklist because it will provide an extra level of protection to the computer lab without being very cumbersome or prone to bugs.

Explanation:

My own original answer.

Does anyone know what's wrong with this code in Unity? HELP FAST PLEASE! This is for my game design course, I will give brainiest if you can help

Answers

its expecting a "{} around a certain area.

hope this helps!!!

The internet is based on which three key technologies?.

Answers

The internet is based on the client/server computing, the packet switching, development of the communications standards for the linking networks and the computers

What is the internet?

The internet is a vast network that connects computers all across the world. It is a wide and open network that can be used to share, communicate and transfer information or data.

The internet is made on HTTP client/server computing, the packet switching, and standards for linking networks and computers TCP/IP, HTTP.

Find out more information about the internet.

brainly.com/question/1757772

Which one of the following does NOT contain a
battery of some type?
A. Portable printer
B. Wired keyboard
C. UPS
D.
iPod

Answers

Answer:

B

Explanation:

took the test a day ago

it would be B. since it’s wired.

A good way to repeatedly perform an operation is to write the statements for the task once and then place the statements in a loop that will repeat as many times as necessary. true or false

Answers

The statement 'a good way to repeatedly perform an operation is to write the statements once and then place the statements in a loop that will repeat as many times as necessary' is TRUE. It is part of Phyton programming.

What do Phyton loops mean?

Phyton loops are specific loops used to execute a statement and/or group of statements many times.

The loops in Python programming include for loop, while loop (that allows to execute a block of statements repeatedly), and nested loop.

In Phyton programming, the loop statements are executed for each specific item of a given sequence.

Learn more about Phyton loops here:

https://brainly.com/question/26497128

What is lost when the computer is turned off

Answers

Answer:

your computer's RAM loses its data when the power is off

Compare the freedom available to the American media with the freedom available to media in other parts of the world. How does a country’s political scenario affect the freedom of media?
ASAP

Answers

in america we are free to say most of whatever we want in media becuase we have free speech here. in other countries, they don't have freedom of speech,and sometimes it also has to do with the political situation. like say in china, where teenagers arent allowed to use the internet for more than a certain amount of time,and arent allowed to talk to each other. thats becuase of the fact that that country is a communist country and the government wants much more control than in other countries.

What was one factor that led to more people seeking jobs in cities and factories?
do any of you gies know how to bet Arceus in legend Arceus

Answers

Answer:

The balance of Economic and political power shifted from agriculture to manufacturing, making industry and cities grow.

Calculate the number of Characters and the size of words “Caleb University Imota, Lagos”using Taro Yamen​

Answers

The code to calculate the number of characters and the size of words is as follows:

x = input("Enter your text here: ")

char=0

word=1

for i in x:

   char = char+1

   if(i==' '):

       word=word+1

print("Number of words in the given string ",word)

print("Number of characters in the given string ",char)

   

Code explanation:

The code is written in python

The first line of code, we store the users input in a variable called x.Then we initialise the variable char to zero.The variable word is also initialise to zeroThe we loop through the user's input and count the character We also look for space to know the word, then count the words .Finally, we print the number of word and the number of character.

learn more on python code here: https://brainly.com/question/20379340

In which type of attack does a person, program, or computer disguise itself as another person, program, or computer to gain access to a resource

Answers

deepfake

Explanation:

a deepfake is when an AI or robot makes an image that looks EXACTLY like a person,or can replicate its voice. does this help?

A(n) ________ portal offers a personalized, single point of access through a web browser to employees located inside and outside an organization.

Answers

A corporate portal offer employees (end users) that are located inside and outside an organization a personalized, single point of access through a web browser.

What is a web browser?

A web browser can be defined as a software application (program) that is designed and developed to enable an end user view, access and perform certain tasks on a website, especially when connected to the Internet.

In Computer technology, a corporate portal is a type of website that is typically designed and developed to offer employees (end users) that are located inside and outside a business firm or an organization a personalized, single point of access through a web browser.

Read more on website here: https://brainly.com/question/26324021

Hurrryyy pleasee!!!!

Answers

Answer:

Show the answer choices

Explanation:

Show the answer choices please

what is used to create a vector image

Answers

Illustrator is an application made by Adobe that is used to create vector images. Because vector images are the native format, vectorizing images within Illustrator is fairly straightforward.

Illustrator is an application made by Adobe that is used to create vector images. Because vector images are the native format, vectorizing images within Illustrator is fairly straightforward.

A network____________________is a physical connection of computer through cables

Answers

A physical network is a physical connection of computer through cables

List some actual physical or psychological hazards that digital technology can inflict on people.

Answers

Answer:

Social media and mobile devices may lead to psychological and physical issues, such as eyestrain and difficulty focusing on important tasks.

...

Eyestrain

screen time.

screen glare.

screen brightness.

viewing too close or too far away.

poor sitting posture.

underlying vision issues.

How can ICTs be used in the workplace to improve the way employees
communicate with each other? Provide any TWO ways.

Answers

Answer:

it allows them to work more efficiently, with fewer waisted resources

Explanation:

Technology that transfers page images composed inside a computer directly to printing plates is called:

Answers

Technology that transfers page images composed inside a computer directly to printing plates is called Computer-to-plate.

What is Computer-to-plate?

Computer-to-plate (CTP) is known to be a kind of modern imaging technology. It is known to be used in the area of modern printing processes.

This technology is one that often forms an image suing a Desktop Publishing (DTP) application which is the output to a printing plate. In the CTP procedure, the plates are said to be made from a variety of materials that is from aluminum to polyester.

Learn more about Technology from

https://brainly.com/question/25110079

Question 13 of 20
To find out what information people are posting about you online, it is
important that you closely monitor:
A. the social media websites you participate in.
B. your text records.
C. your insurance records.
D. your phone records.

Answers

Answer:

A. the social media websites you participate in.

Explanation:

To know what information people are posting about you online, it is important that you closely monitor your account in social media.

You want to build a computer that is designed to stand upright on a desk and takes up the least amount of space possible, but still capable of two expansion slots. Which type of computer would you select?

Answers

Answer:

Micro ATX slim tower.

This is a special type of thin computer that has good processing and satisfies people who want less space taken up.

name any two software programs that employees can use to communicate effectively ​

Answers

Answer

unified communication software or video conference.

Explanation:

help pls
cmu cs 0
4.1.2.1 Creating Groups checkpoint 1

Answers

Answer: For each group, you want to add, click the [ +] sign and select it from the list that shows. A Check Point Host can have multiple interfaces but no routing takes place. It is an endpoint that receives traffic for itself through its interfaces. (In comparison, a Security Gateway routes traffic between its multiple interfaces.)

Explanation: The Check Point Rule Base must not have these objects. If it does, the Security Management Server will not generate Access Lists. OSE devices report their network interfaces and setup at boot time. Each OSE device has a different command to list its configuration. You must define at least one interface for each device, or the Install Policy will fail.

Outline various methods of collecting data

Answers

Answer:

interviews

observation

questionering

4.
Give the name of a non-portable device that is suitable for creating documents
and browse the web?
(1)

Answers

Answer:

Desktop Computer.

Desktop computers is a non-portable device that is suitable for creating documents and browse the web.

What is a Desktop computer?

A desktop computer is a piece of personal technology made to sit on top of an ordinary office desk.

It links to input devices like the monitor, keyboard, and mouse that users use to interact with a computer's actual hardware.

Desktop computer: a laptop that can fit on or under a desk and is intended to be stationary. Usually, it has a tower, keyboard, mouse, and monitor (system unit).

The desktop is the virtual workspace offered by Microsoft Windows that resembles a real desktop. A work space and taskbar are included. The workspace could encompass several displays.

Desktop computers are a non-portable device that work well for word processing and web browsing.

Thus, the non-portable device is Desktop computer.

For more details regarding Desktop computer, visit:

https://brainly.com/question/29130374

#SPJ2

10 effects that you can find in Audacity.

Answers

Answer: Distortion.

Echo.

Limiter.

Paulstretch (extreme stretch)

Phaser.

Reverb.

Reverse.

Truncate Silence.

etc

Explanation: this is it

What asks users to write lines of code to answer questions against a database?.

Answers

Answer:helps users graphically design the answer to a question against a database. structured query language (SQL). 

Explanation:

Question 12(Multiple Choice Worth 3 points)
(Lesson 6.2 LC)
When two cars arrive at a four-way stop, which car must yield the right-of-way?
O The car to the left
O The car to the right
The car that arrives second
o
Both cars have the right-of-way

Answers

Answer: the car that gets there second the one who gets their first goes first

Explanation:

i drive lol

which microsoft azure service is a eelational service that allows for rapid creation of relational databasses and apps

Answers

Answer:

Azure SQL Database

Explanation:

If you want to clear an operating system's temporary files for storage, performance, or privacy reasons, you should run a disk _________ utility.

Answers

Answer:

Cleanup is correct:)

Explanation:

If you wanted to find the greatest number in a series of numbers, you would use the _____ function. Please help!
A. Sum
B. Max
C. Min
D. Average

Answers

When you wanted to find the greatest number in a series of numbers, you would use the Max function.

What is Max function?

The MAX function is known to be the function that is said to often brings back the biggest numeric value in the data that were given.

Note that if a person needs to find the greatest number in a series of numbers, you would use the Max function as it is the one that can help you to do that work.

Learn more about Max function from

https://brainly.com/question/82347

#SPJ5

Other Questions
Fully describe the association that would exist between variables with the given correlation coefficient. (a) r=0.6578 (b) r= 0.1648 (c) r = -0.9875 how can community participation benefits south african ? Rayon was one of the first manufactured fibers. It was made by treating and "regenerating" which material?a)Celluloseb)Clayc)Ionic polymersd)Plastic After age 65, most people are attempting to assess their lives and make sense of life and the meaning of their contributions. Within the psychosocial model of development, what is the primary developmental task of this stage?. Multiply (polynomials) I WILL GIVE BRAINLIEST, NEED IT TODAY only 15 left just tell me when you cant help no more Determine a series of transformations that would map Figure E onto F. Directions: Follow each of the directions and write your own sentences withnouns. Circle each of the nouns that you write.. Don't worry about the order. For example if it says (person, place, thing) they don't have to be inthat exact same order in your sentence.1) Write a sentence that has 1 Noun (thing).2) Write a sentence that has 2 Nouns (person, thing).3) Write a sentence that has 3 Nouns (person, place, thing).4) Write a sentence that has 3 Nouns (thing, thing, thing).5) Write a sentence that has 4 Nouns (place, place, thing, thing).6) Write a sentence that has 4 Nouns (person, place, thing, thing). Find a common denominator and then subtract and simplify your answer.11/12-3/4a: 1/7b: 1/5c: 1/6 Help plss it's due today??...! a couch at the wholesale price is $125. If the markup rate at the furniture store is %40,what is the price of the new couch Theo wants to work in a field where he can make a difference in his community but also make the highest salary possible. However, he is not interested in going to college. Which might be the best option for Theo?correctional officerpolice officerlawyerprobation officer A circle is drawn on the coordinate plane. Ithas a center at (2, 1) and passes through thepoint (2, 5). What is the approximatecircumference of the circle? please answer quickly i do not know this answer. it has to be rotation 270 clockwise around the origin. PLEASEEE HELP ME I REALLY NEED HELP!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! which of the following is NOT an indication that a web site contains reliable health information What is the trigonometric ratio for cos N? Enter your answer, as a simplified fraction. If you could go on a field trip anywhere, Where would you want to go? Explain in complete sentences. Compare how energy is used worldwide with how it is used in the United States.