1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
3 years ago
13

An online conference room reservation system lets a user reserve rooms. The user is required to enter contact information and re

servation detail before saving the room reservation. Which of the following identifies the use cases?
a)
Reserve Room.

b)
Reserve Room, Enter Contact Information, Enter Reservation Detail.

c)
Reserve Room, Enter Contact Information and Reservation Detail.

d)
Reserve Room, Save Reservation.
Computers and Technology
1 answer:
lisov135 [29]3 years ago
7 0

Answer:b)Reserve Room, Enter Contact Information, Enter Reservation Detail

Explanation: The use case is described as actors , actors goal, usage of use cases, units of scope and initial point and terminating point of use cases .

The situation mentioned in the question will take place for the reservation of the room through the instances in the form like filling the contact details for the identification , filling out reservation information as well for getting the knowledge about the room requirement by the person.

These details help in reaching out the particular person if required, number of days he wants to book the room,any extra facility he would like to have etc. After these detail filling activity the room can be reserved successfully.Thus , the most appropriate option is option (b).

Other options are incorrect because room reservation cannot be done without any formality as mentioned in the question and entering contact detail and reservation detail one by one.

You might be interested in
Sabian que hay una violadora sexuar el nombre de usario es SASHENKAFASION me acaba de decir que hackio en donde vivo,mi nombre c
grin007 [14]
Gracias por avisar eres muy amable
4 0
3 years ago
. One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t
Komok [63]

Answer: C)report the status of individual computer users

Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.

Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)

3 0
3 years ago
If you try to add a new item to a full stack the resulting condition is called a(n)?
Butoxors [25]

Answer:

it's called an overflow

3 0
2 years ago
What are the limits of hashing and verifying that files haven’t changed?
earnstyle [38]

The hashing function can take any number of key-value pairs and there is no specific limit to it.

<h3>What is hashing?</h3>

Hashing is a file-based algorithm for producing a fixed-length bit string value. A file is essentially a collection of data blocks. The length of the data is reduced by hashing to a fixed number or key that represents the original string.

When hashing is employed, the hash function may plot all of the keys and values to what the real size of the table is, demonstrating that the hashing function can take any number of key-value pairs with no restriction.

However, if the passwords are hashed in encryption, recovering the passwords is extremely difficult.

Thus, the hashing function can take any number of key-value pairs and there is no specific limit to it.

Learn more about the hashing here:

brainly.com/question/13106914

#SPJ1

5 0
2 years ago
Which process is used to protect transmitted data in a vpn?
wlad13 [49]
Here is the answer: <span>Tunneling</span>
3 0
3 years ago
Other questions:
  • How can you recognize an unsecured wireless network?
    9·1 answer
  • Software that was designed to serve the needs of a specific company or organization is called:
    5·1 answer
  • How people have contributed to the advancement of science
    7·1 answer
  • A service provider, hardware, and web browser are needed to connect to __________.
    8·2 answers
  • Which of the following is a name for the place an information services and support professional might work? software development
    15·2 answers
  • can you give me a tip to fix my SIM card becuaus when i put it on my phone it has no signal , can anyone fix this , thank you.​
    9·2 answers
  • What is the difference between "What I ought to do?" and "What kind of person should I be"?
    12·1 answer
  • What is digital scavenger hunting? A. An application that locates addresses B. A scavenger hunt where players use GPS and digita
    5·1 answer
  • Question #5
    15·2 answers
  • What is the Cycle of Dependency?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!