1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blsea [12.9K]
3 years ago
9

When building systems, the only two entities that constitute software engineering are people and process.

Computers and Technology
1 answer:
VLD [36.1K]3 years ago
7 0

Answer: False

Explanation: Software engineering is the designing, analyzing, creating the software application as per the requirement of the user. The programming languages is the base for the designing of the application the software engineering field.

At the time of building system ,there is the requirement of many resources for the development.There is the requirement of the software skills, programming knowledge, resources and tools for the working and designing.Thus, there are different resources, people,skills processes, problem solving skill etc required for the building of the system.

You might be interested in
Which statement is true about laptops? Laptops use fewer components than desktops use. Most of the internal components that are
elena-14-01-66 [18.8K]

Answer:

Option 2 is correct.

Explanation:

Option 2 is correct because most of the components used in laptop is far different from Desktops. They are not able to fix in desktops. They are designed specially for laptops.

8 0
3 years ago
Read 2 more answers
Can anyone help me ?
IrinaVladis [17]

Answer:

System.out.printIn("Hello, world" );

Its " ); " and not " ) ; "

5 0
2 years ago
A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve
sattari [20]

Answer:

IPCONFIG Pls mark brainliest

Explanation:

3 0
3 years ago
Write an exception tester application that enables you to see the impact of exceptions being thrown. Include multiple catch clau
AveGali [126]

Answer:

using System;

using System.Collections.Generic;

using System.Linq;

using System.Text;

namespace ConsoleApplication1

{

class Program

{

static void Main(string[] args)

{

Console.WriteLine("\t\tHandling Exceptions Program");

Console.WriteLine("\n\tArithmetic Exception:\n");

// Arithmetic Exception is base class of DivideByZero Class

// Hence will be using DivideByZero Exception

int b = 0;

try

{

//Attempting Divide BY Zero

int myBadMath = (5 / b);

}

catch (System.DivideByZeroException ex)

{

Console.WriteLine("Error : Trying to divide a number by Zero");

}

//FormatException example

//Used when formats DO NOT match a data type

Console.WriteLine("\n\tFormat Exception:\n");

Console.WriteLine("Please enter a number :");

string str = Console.ReadLine();

double dNo;

try

{

//throws exception when a string is entered instead of a number

dNo = Convert.ToDouble(str);

Console.WriteLine(dNo+" : Is a valid number");

}

catch (FormatException ex)

{

Console.WriteLine("Error : "+str+" is not a valid number");

}

//IndexOutOfRangeException example

//Thrown when an element is attempted to assign or read out of the array size

Console.WriteLine("\n\tIndexOutOfRangeException Exception:\n");

try

{

//5 element array declared

int[] IntegerArray = new int[5];

//attempting 10th element. Hence error is thrown

IntegerArray[10] = 123;

}

catch (IndexOutOfRangeException)

{

Console.WriteLine("An invalid element index access was attempted.");

Console.Read();

}

}

}

}

Explanation:

8 0
3 years ago
Technology that is attached to a tag and used to identify postal packages is a(n) _____.
Dmitry [639]
Technology that is attached to a tag and used to identify postal packages is a(n) RFID.
__________________________________________________________

RFID:  Radio-Frequency Identification

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following statements expresses why the following code is considered bad form? for (rate = 5; years-- > 0; System
    9·2 answers
  • Generally considered to be the most important information security policies, what item below defines the actions a user may perf
    15·1 answer
  • You have been handed a mysterious piece of data by an unknown person. Judging by his shifty eyes and maniacal laughter you don't
    12·1 answer
  • How to connect tablet to your bluetooth at home?
    6·1 answer
  • package dataStructures; /** * Class OrderedLinkedList. * * This class functions as a linked list, but ensures items are stored i
    8·1 answer
  • Mrs. Patel uses a computer program to balance her checkbook. Which of the following best explains how the
    13·1 answer
  • The development of computer languages is classified into two categories .<br><br>true or false​
    11·1 answer
  • Predict the output
    7·1 answer
  • Explain why a sound background in auto electricity and electronics is absolutely necessary if you are to troubleshoot
    15·1 answer
  • Are there any Potential Dangers in Artificial Intelligence?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!