1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
1 year ago
7

Identify an internal user who uses product lifecycle management (plm) software and its data.

Computers and Technology
1 answer:
Andrej [43]1 year ago
3 0

<u> Quality assurance manager</u> is an internal user who uses product lifecycle management (plm) software and its data.

<h3>What is quality assurance manager?</h3>

The quality assurance manager is accountable for delivering optimum quality of a company's benefits or goods. In addition to maintaining constant quality, they help to ensure keeping with laws, regulations, and environmental standards, recommending improvements where required.

<h3>What is the qualification of a Quality Assurance Manager?</h3>

Quality Assurance Manager Requirements:

Bachelor's degree or associate's with knowledge in the field. Technical proficiency must be able to use computers and generate reports. Capacity to analyze data and create and review processes. Excellent communication skills.

To learn more about quality assurance manager, refer

brainly.com/question/15855298

#SPJ4

Complete question is,

a. Packaging supplier

b. Contract manufacturer

c. Manufacturer's design partner

d. Quality assurance manager

You might be interested in
Many contemporary languages allow two kinds of comments: one in which delimiters are used on both ends (multiple-line comments),
m_a_m_a [10]

Answer and Explanation:

Multiple-line comments :

Advantage :In the event that we need to remark out of zone of the given program , we can utilize it.

Disadvantage : In numerous line results are in reduced unwavering quality. It stretches out the remark as far as possible of the following comment.For least difficult approach to unintentionally leave off the last delimiter, which successfully expelling code from the program.

Single Line Comments :

Advantage :In the event that you need to close all the delimiter before close the program we utilize this kind of remarks.

Disadvantage : It put more burden on your program .It repeated on every line of a block of comments

3 0
3 years ago
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
Which term is used to describe a network security device or host software that filters communications, usually network traffic,
morpeh [17]

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

  • A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
  • An auditor can be defined as a program that is used to analyze the network.
  • The hacker can be a person who hacks the system to gain access or gather information.
4 0
3 years ago
System design is the determination of the overall system architecture-consisting of a set of physical processing components, ___
Alenkinab [10]

Answer:

C) Hardware, Software, People

Explanation:

System design is the determination of the overall system architecture-consisting of a set of physical processing components, Hardware, Software, People and the communication among them-that will satisfy the system’s essential requirements.

5 0
3 years ago
Read 2 more answers
A Software Developer wants to add a new feature to an existing application operating in the Cloud, but only wants to pay for the
Mamont248 [21]

A term which describes this feature of cloud computing is: C. serverless computing.

<h3>The features of cloud computing.</h3>

In Computer technology, the features of cloud computing include the following:

  • Elasticity
  • Pooled resources
  • On-Demand self-service
  • Multitenancy
  • Serverless computing

In Cloud computing, serverless computing is a feature that is typically used to add a new feature to an existing software application that is operating in the Cloud while having to pay only for the computing time which the software code actually uses when it is called.

Read more on cloud computing here: brainly.com/question/19057393

#SPJ1

8 0
2 years ago
Read 2 more answers
Other questions:
  • The purpose of the ____________ element is to provide a method for a browser to display different images depending on specific c
    14·1 answer
  • Swapping two numbers
    10·1 answer
  • Explain why there is an overlap of skills and qualities in design professions​
    14·1 answer
  • Suppose there is a class Alarm. Alarm has two class variables, code which contains a String value representing the code that dea
    12·1 answer
  • A good way to assess your CPU usage is to:_______.
    13·1 answer
  • 3n - 12 = 5n - 2<br> how many solutions?
    15·1 answer
  • What is the full from of CPU?​
    5·2 answers
  • Explain the<br>4 ways<br><br>ways of arranging icons.<br><br>​
    6·1 answer
  • Android OS "AFTER" Alpha.<br><br> A. Bubblegum<br><br> B. Beta<br><br> C. Berry<br><br> D. Buzz Cola
    10·1 answer
  • What is the difference between spyware and adware?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!