1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mina [271]
3 years ago
9

What is code reuse meant to do?

Computers and Technology
1 answer:
Harman [31]3 years ago
5 0
Code reuse<span>, also called </span>software reuse<span>, is the use of existing </span>software<span>, or software knowledge, to build new software,</span>
You might be interested in
Which one of the following rules for selecting a password is the best?
horsena [70]

Answer:

(b) 7 characters: 4 Numbers, 1 Lowercase Letter, 1 Uppercase letter, 1 Symbol

Explanation:

The best rule that makes a password great is that rule that increases the entropy of the password. The entropy of a password is the measure of how easy it is for the password to be cracked e.g by guessing, by brute force cracking, by dictionary attacks and other related cracking methods.

A rule that makes use of a logical combination of the four types of characters - digits, lowercase letters, uppercase letters and special symbols - gives a greater strength to the password than the rules that just make use of the some of the four types of characters.

Increasing the length of the password too is a great way of increasing the entropy of the password. But then, if there is a trade-off between length and combination, the latter is better.

3 0
4 years ago
Read 2 more answers
Which of the following statements is/are correct? a. At the network layer, entitlement can map identity and/or attributes to fun
AlekseyPX

Answer:

Option D

Explanation:

An Entitlement is an option to utilize, get to or devour an application or asset, commonly for a charge. For instance, a client may buy an Entitlement to utilize an application in ceaselessness (a "unending" permit), or they may buy a period restricted option to utilize an application, (for example, a one-year membership permit).

7 0
3 years ago
Trish has bought a new computer that she plans to start working on after a week. Since Trish has not used computers in the past,
kotegsom [21]
Hello, I am charlespierce576! I believe I might have the answer! Simple policies such as turning of off devices not in use. Also unplugging devices during a storm.
4 0
4 years ago
IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally,
elixir [45]

Answer: True

Explanation:

System development is the process in which a system is developed,planned, designed,tested, modified etc. Analysis of design,internal structure and external factors is done for implementation to creation of system.

  • An IT professional is responsible for performing various tasks in system development.He/she has to analyze and detect that the developed system is convenient for user.
  • Involvement of user also plays an important part in system development through various ways such as improvement in system, smooth implementation,innovation,enhancing quality etc.
  • So, user can be involved in official or unofficial manner for betterment of system development.
  • Thus, the given statement is true.
3 0
3 years ago
Ann is in the middle of completing her first 1040EZ tax form. She has some questions about an instruction on the form. What shou
CaHeK987 [17]

Answer

She should probably consult the IRS website, but asking someone who has been doing taxes for many years would also be a good idea.

Explanation

IRS Tax Form 1040EZ is the shortest federal individual income tax form. It is designed for taxpayers whose filing status is single or married filing jointly with no dependents.

Form 1040EZ  is for people under age 65 with no dependents and no itemized deductions who make no more than $100,000.

3 0
3 years ago
Read 2 more answers
Other questions:
  • What is the software called that allows the user to create, access, and manage a database? question 8 options:
    10·1 answer
  • 2. Now write a program named filereader.py that reads and displays the data in friends.txt. This program should also determine a
    5·1 answer
  • Which area of physics governs wireless communication?
    10·2 answers
  • The data in a data warehouse have which of the following characteristics?
    12·1 answer
  • The software used to help run the computer hardware is the _____.
    9·2 answers
  • 1. What are the built-in operations on classes?
    8·1 answer
  • Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop shou
    5·1 answer
  • it is used to hold screws, jumpers, fasteners, and other small parts and prevent them from getting mixed together​
    15·2 answers
  • What is the fullform of ETA in computer term​
    15·1 answer
  • A program with a graphical user inter-face for displaying HTML files, used to navigate the World Wide Web.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!