1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yuradex [85]
3 years ago
15

In 1-2 paragraphs discuss the three main purposes of design and provide examples for each. Also explain how a design might serve

two or more of these purposes.
Computers and Technology
1 answer:
Norma-Jean [14]3 years ago
4 0

Answer and Explanation

A design is is is where one creates a plan when he or she wants to construct or to come up with a a certain or a specific object.It might be a a system, a business process e.t.c

The main purposes of the design process are :

i)The establishment of instructional effectiveness- This one helps in defining the goals for the required  outcome in the accomplishment of the process. An example the student will understand the procedure of system development

ii) It guides the in the content development. In this it helps in identification of of the steps to be involved in accomplishing the set goal. and example is if the the goal was to come up with a certain structure, when the necessary steps are followed the goal will come true.

iii)It helps in the identification of the instructions outcome. When you have a design it will help one to exactly implement it to come up with what was in the mind in the end of the process.

You might be interested in
"When an interrupt or a system call transfers control to the operating system, a kernel stack area separate from the stack of th
pochemuha

Answer:

Explanation:

There are two reasons, first, the operating system could be blocked because a program with poorly written user program does not allow for enough stack space.

Second, the kernel can leave data in the user memory of a program, and this data can be used for another user to get another delicate information.

3 0
4 years ago
List and briefly defined categories of security services.
Fynjy0 [20]
There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
7 0
4 years ago
2×2×2×2×2×2×2×2:-) :-) :-) :-) :-) :-) :-! ​
Gre4nikov [31]

Answer:

256 :-) :-) :-) :-) :-) :-) :-! ​

5 0
3 years ago
Read 2 more answers
What is instant messaging
SpyIntel [72]
Instant messaging (IM) is a type of communication where one person can send a message (typically text based) and have another (1 or more) recipient receive the message.
6 0
3 years ago
An application that can be launched from my web browser is known as a _____. java applet spreadsheet cad software music applicat
SIZIF [17.4K]
An application that can be launched from my web browser is known as a java applet. Java applet is a <span>small application which users can launch from a web-page, that clearly coincides with the statement in the task. As you can see, java is the most appropriate word for the gap.
Regards.</span>
4 0
3 years ago
Other questions:
  • Marco makes $65,000 a year as a graphic designer. He makes a charitable donation of $1,000 each year. He also has $5,000 of busi
    12·2 answers
  • A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some
    11·1 answer
  • Do routers have ip addresses? if so, how many?
    10·1 answer
  • âthe first line in a hypertext markup language (html) file is the _____, which is a processing instruction indicating the markup
    9·2 answers
  • Consider the following MARIE Code: 100 If, Load X /Load the first value 101 Subt Y /Subtract the value of Y, store result in AC
    8·1 answer
  • A qué escala está dibujado el plano del Instituto si sabemos que la puerta principal de entrada tiene un ancho 3,40 metros y en
    14·1 answer
  • Why linked list is better than an array?
    7·1 answer
  • Why do relational databases use primary keys and foreign keys?.
    12·1 answer
  • 9. Changing from a bystander to an advocate requires
    5·1 answer
  • Which of the following was the first computer-animated film to win animated film to win an academy award?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!