1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ad libitum [116K]
3 years ago
14

What are issues to consider when deciding to build software in-house or purchase commercial off-the-shelf software (cots)?

Computers and Technology
1 answer:
Scrat [10]3 years ago
7 0
<span>On the computer there are always issues. For a developer to sit all day in front of a google that always invents things and the flashy images that disrupt everything. Googling on facebook is also an issue. Youtube, everything that contain flashy image is quite disruptive. If you think about content, maybe googling is less inventive. In a way it's nicer to buy applications but if you finally think of building it, there are always nicer ways of spending time. I prefer to go to seaside when I can.</span>
You might be interested in
Write a second convertToInches() with two double parameters, numFeet and numInches, that returns the total number of inches. Ex:
mixer [17]

Answer:

   public static double convertToInches(double numFeet, double numInches){

       return (numFeet*12)+numInches;

   }

Explanation:

This technique of having more than one method/function having the same name but with different parameter list is called method overloading. When the method is called, the compiler differentiates between them by the supplied parameters. The complete program is given below

public class FunctionOverloadToInches {

   public static void main(String[] args) {

       double totInches = 0.0;

       totInches = convertToInches(4.0, 6.0);

       System.out.println("4.0, 6.0 yields " + totInches);

       totInches = convertToInches(5.9);

       System.out.println("5.9 yields " + totInches);

       return;

   }

   public static double convertToInches(double numFeet)

       {

           return numFeet * 12.0;

       }

       /* Your solution goes here */

   public static double convertToInches(double numFeet, double numInches){

       return (numFeet*12)+numInches;

   }

}

5 0
3 years ago
When data is being prepared for transmission onto the network, it is broken into small pieces and a header and trailer are added
Archy [21]

Answer:

The correct answer to the following question will be "Encapsulation".

Explanation:

  • Encapsulation relates to the pooling of data with techniques used by the database or the limitation of immediate access to many of the elements of the entity.
  • As data is being processed for transfer to the network, it's split into tiny pieces and a trailer and header are attached to each piece to help determine it.
  • It is a method of shielding data facts and preserving the object's data and actions from abuse by certain objects.

Therefore, Encapsulation is the right answer.

8 0
3 years ago
Which is an advantage of setting bookmarks?
sesenic [268]
To navigate you easier next time you want to visit your favorite website
4 0
3 years ago
Discretionary access control is an approach whereby the organization specifies use of resources based on the assignment of data
Lorico [155]

Answer:

This statement is false. This is the work of Mandatory Access controls (MACs)

Explanation:

Discretionary Access Control (DACL) is an example of Access Control Model (ACL) found in objects of a data user in a computer system. They are security descriptors that issue a list of permissions to users, i.e. who has permissions to access an object. It is discretionary as the name suggest to mean which users have permissions to what files on a windows or linux environment.

On the other hand, Mandatory Access controls (MACs) is an approach whereby the organization specifies the use of resources based on the assignment of data classification schemes to resources and clearance levels to users. It is non-discretionary and is based on how the operating system makes decisions on a security label system. The operating systems grants or disallow access rather than the data owners. They are used so much where classification and confidentiality is of utmost importance

6 0
3 years ago
What does the asterisk (*) after select tell the database to do in this query?
koban [17]

The asterisk (*) after SELECT informs the database to select all data that meets the criteria as stated in the query.

<h3>What is the asterisk star symbol (*) used for?</h3>

An asterisk is known to be a star-shaped symbol (*) that often employs in a  writing. Note that it often clarify a statement.

Therefore, The asterisk (*) after SELECT informs the database to select all data that meets the criteria as stated in the query.

Learn more about asterisk from

brainly.com/question/1620017

#SPJ11

8 0
1 year ago
Other questions:
  • The person or persons requesting the worksheet should supply their requirements in a _____ document
    6·1 answer
  • What type of camera is a cell phone camera
    14·2 answers
  • A new computer workstation has been installed in a small office. the user of the workstation can print a document using a networ
    9·1 answer
  • Which information is considered free for use?
    9·2 answers
  • What kind of information can be found in a ROM:
    14·1 answer
  • Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not acces
    5·1 answer
  • Give ways on how to effectively save.​
    15·1 answer
  • You are studying for a test tomorrow. Your friends invite you to
    12·1 answer
  • What is nested selection?
    7·1 answer
  • Which three options below describe typographic hierarchy?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!