1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hram777 [196]
2 years ago
8

The _____ method of developing systems produces code that is modular and reusable.

Computers and Technology
1 answer:
Ymorist [56]2 years ago
8 0

The object-oriented analysis method of developing systems produces code that is modular and reusable.

<h3>What is object oriented system analysis?</h3>

Object-oriented systems analysis and specification (OSA) is known to be a kind of a method that is often used in regards to systems analysis and this is known to be one that helps to create or builds on the strengths of former systems and, at also at the same time, look into their weaknesses.

Note that this is said to be the basic idea behind the OSA methodology that are known to be described. The framework of OSA system models is known to be object class.

Hence, The object-oriented analysis method of developing systems produces code that is modular and reusable.

Learn more about object-oriented  tool from

brainly.com/question/11158544

#SPJ1

You might be interested in
Variable index has a value of 4, and variable accessValid has a value of False. What value does variable, accessPoints, have aft
snow_lady [41]

Answer:

10

Explanation:

If index is greater than or equal to 2, accessPoints will increase by 10 even if accessValid is false because the if statement states that if index is greater than or equal to 2 OR accessValid is true. The if statement gets executed if either expression is true, and index is greater than 2 because index has a value of 4.

8 0
3 years ago
Unscramble the risks of sharing files on the Intern
Zinaida [17]

Answer:

Broken Firewall, Piracy, Malware, Virus, adware

Explanation:

Please give brainliest if this helps

4 0
3 years ago
Which of the following information would best be displayed throughout the use of a time line
tresset_1 [31]

the best answer to me is D

7 0
3 years ago
Charles is having a lot of problems with errors in a very complicated spreadsheet that he inherited from a colleague, and he tur
Kobotan [32]

Charles is having a lot of problems with errors in a very complicated spreadsheet that he inherited from a colleague, and he turns to another co-worker, Seymour, for tips on how to trace errors in the sheet. Seymour tells Charles that all error values begin with the same symbol, so they can be easily identified as errors.

The symbol is A)#.

Explanation:

  • An error is something you have done which is considered to be incorrect or wrong, or which should not have been done.
  • Generally errors are classified into three types: systematic errors, random errors and blunders
  • Error values begin with the same symbol as they are easy to identify. Once an error is identified, it can be corrected.
  • Error correction is the process of detecting errors in transmitted messages and reconstructing the original error-free data. Error correction ensures that corrected and error-free messages are obtained at the receiver side.
  • Error Correction can be handled in two ways: Backward error correction: Once the error is discovered, the receiver requests the sender to retransmit the entire data unit. Forward error correction: In this case, the receiver uses the error-correcting code which automatically corrects the errors.

3 0
4 years ago
Which for loop will iterate 100 times? Group of answer choices for (i = 0; i &lt; 99; i++) for (i = 1; i &lt; 99; i++) for (i =
cupoosta [38]

Answer:

for (i = 0; i < 100; i++);

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
    13·1 answer
  • Which is a benefit of peer-to-peer networking?
    10·1 answer
  • ShellShock had the potential for an unauthorized user to gain access to a server. It affected many internet-facing services, whi
    11·1 answer
  • How do u beat sonic unleashed
    8·1 answer
  • Understanding the context of information allows you to apply it to everyday situations as opposed to just___facts like names,dat
    12·1 answer
  • Which tabs are expandable and collapsible? This would be in word 2010
    6·1 answer
  • You need to synchronize your mobile device data with your desktop computer. for security reasons, your organization prohibits sy
    5·1 answer
  • True or False: VLANs in cloud computing are most likely to be found on direct connections with a CSP.
    9·1 answer
  • What is<br> a an<br> output device
    10·1 answer
  • What open source format has multiple versions for storing audio and video content?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!