1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BARSIC [14]
2 years ago
14

The _____ layer addresses how the software will execute on specific computers and networks.

Computers and Technology
2 answers:
Alex17521 [72]2 years ago
6 0

The problem domain layer addresses how the software execute on specific computers and networks.

The problem domain layers guide us how the software execute on specific networks or computer.

There are different layers in problem solving. The problem domain layer is the first layer which addresses the solution to a problem. Problem doamin can be different for different fields or domains.

In computer sciences, the problem domain identify the problem and its solution. In the problem domain layer, programmer or the person or any organizations who is developing the software program, specify which computers and network will be used to execute the software.

For example, if there is a computer network applications, then the problem domain addresses how to execute it on computer network. While if the application is desktop, then the problem domain addresses which computer (windows, mac or any other) to use to execute the application.

You can learn more about problem solving strategy at

brainly.com/question/23945932

#SPJ4

lidiya [134]2 years ago
3 0

The problem domain layer addresses how the software will execute on specific computers and networks.

A problem domain is a software engineering term that refers to all information that defines a problem and compels the solution.

A problem domain basically looks at only the area you are interested in and excludes the rest. It includes the goals the problem owner wishes to have and the context in which the problem exists. For example, if you are creating a website for selling artwork online, the problem domain will be artwork and eCommerce.

Therefore, in order to identify a problem domain, you need to know the relevant user requirements. This can be easy when you start by finding out what people (users) think the problem is.

#SPJ4

You might be interested in
What is the range of the well-known ports used by tcp and udp?
melamori03 [73]
/etc/services on my CentOS machine goes up to 49000. Reserved ports are less than 1024.

Well known and reserved ports are two different things. Well known ports only need a registration with IANA. Reserved ports, on *nixes, requires root for a deamon to bind to the port.
8 0
3 years ago
Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the
ira [324]
  • The subnet mask would be a 32-bit integer which is formed by assigning the host bits to all 0's and the networking bits to so many 1's.
  • In this method, the subnetting separates the IP address between host and network addresses.
  • The subnet mask covers an IP address with its 32-bit number, thus the term "mask".

Given:

Network IP address \bold{= 172.149.254.0 /24}

Subnet numbers \bold{= 13}

Calculating the borrow bits:

\to  \bold{= ceil(\log_{2} 13) = 4 \ bits}

a)

Calculating the dotted decimal value for the subnet mask:

\to \bold{11111111.11111111.11111111.00000000}\\\\\to \bold{255.255.255.240}\\\\

b)

The additional bits which will be needed to mask the subnet mask that is = 4.

Learn more: brainly.com/question/2254014

4 0
3 years ago
Which statement accurately compares the restart at 1 and continue numbering featured of word
Andrews [41]

Answer: the continue numbering feature can be used to maintain the numbering order in a list and the restart at 1 feature can be used to make a new list

Explanation:

7 0
3 years ago
Read 2 more answers
Which software is used to play, create, and modify audio and video files?
Alenkasestr [34]
Windows Movie Maker, iMovie, Final Cut Pro (x), QuickTime?
8 0
3 years ago
Read 2 more answers
A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a _____.
masha68 [24]

This is a trojan horse type of virus.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Windows uses a graphical user interface (GUI), which means: a user can carry out commands by clicking, dragging, or otherwise ma
    6·1 answer
  • ________ is typically used as the last string of letters in the name of a website. Group of answer choices the name of the indiv
    13·1 answer
  • Your desktop computer monitor is not displaying a picture. What would you do to troubleshoot the problem?
    7·2 answers
  • A computer lab has two printers. Printer I handles 40% of all the jobs. Its printing time is Exponential with the mean of 2 minu
    8·1 answer
  • True or False: It is illegal to park in a location that you block or create a hazard for other vehicles.
    11·2 answers
  • 27. List four advantages of Computer Aided Design over traditional hand
    10·1 answer
  • What are some effective methods for scrolling? Check all that apply.
    6·1 answer
  • A red wavy line under a word means _____. a change has been made in the text a new word was inserted in the document there is a
    11·2 answers
  • Jorge is looking for information about the life of his favorite music artist, Ray Charles. Which type of resource(s) would provi
    13·1 answer
  • Please help this is a coding assignment I need help! (use python)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!