The answer is increase cohesion. <span>Programmers should strive to increase cohesion. C</span>ohesion<span> points to the </span><span>degree to which the elements inside a module belong together. </span><span>In a highly </span>cohesive<span> system, code readability and reusability is </span>increased<span>, while complexity is kept manageable.</span>
Hardware:
-physical parts of a computer that cause processing of data
-can be connected (physically) & can touch
- Hardware wares out during/over time
-Hardware failure is random
Software:
-A set of construction that tells a computer exactly what to do
-software is logical in nature
- dose not have an increasing failure rate
Similarities
- Behavior; Users interact with the products in various ways
- Products produce outputs and given inputs
-they have functional (user facing) and non functional (non user facing) requirements
-They are both complex (any representation of product specifications lead to a main structure)
Differences
- Software is easier to change then hardware
- Software testing is done by specialized quality assurance (QA) engineers, while hardware is done by engineers who are creating the product
-Hardware must be designed and tested to work over a range of time and environmental conditions, which is not the case for software
- Hardware designs are constrained by the need to incorporate standard parts
(Hope this helps?)
Answer:
I believe it is ‘A’
Explanation:
The Format Painter feature copies only the formatting from one selected text to another. The content and text of the selection will not be copied using Format Painter.
Answer:
Weather can affect sailing because if its raining it can sink it also if theres a storm. Good weather that would be good to sail in is if its a little windy because if its just sunny and not windy it wont move. ps you can copy it if u want idc
Answer:
Advanced persistent threat.
Explanation:
Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.
It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.