1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr1967 [171]
4 years ago
9

What education and training is required to be an applications software engineer?

Computers and Technology
1 answer:
Vitek1552 [10]4 years ago
7 0
Expertise in Computer Science/ Computer Programming Tools. C, C++, Java Visual Basic , Android or iphone. BS Software Engineering
You might be interested in
Clive wants to print the numbers 1 through 10, so he uses the following code.
snow_tiger [21]

If Clive wants to print the numbers 1 through 10 with the code:

for x in range(10):

    print (x)

He will not get the output he wants because python begins counting at 0, so the numbers 0 through 9 will print.

<h3>Code explanation</h3>

The code is represented in python.

  • We loop through the number in the range 10.
  • Then print the the looped numbers.

Generally, python begins counting from 0. Therefore, the numbers that will be printed are as follows:

  • 0
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9

learn more on python here: brainly.com/question/26104476?referrer=searchResults

8 0
2 years ago
In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt
ra1l [238]
The answer is DNS Cache Poisoning

Also known as DNS spoofing, this is a type of attack that exploits the Domain Name System to divert traffic away to legitimate servers. It inserts corrupt data into the cache database of the DNS server. In this attack, a hacker sends forged responses from an imposter DNS with an intention to reroute a domain name to a new IP address. This new IP is almost always controlled by the hacker.

       




6 0
4 years ago
A business letter is not written:
Andreas93 [3]

Answer: the answer is b

Explanation:Bc why would they make a business letter 2 someone else

5 0
3 years ago
Many types of academic writing require multiple sources ?<br><br> True<br><br> False
ValentinkaMS [17]

Answer:

True!

Explanation:

A few types that need them are;

News articles

Narratives

Opinion writes

Etc

6 0
3 years ago
Read 2 more answers
Today's networks can offer differing levels of ________, which include specifications for maximum delay and minimum throughput
xeze [42]
The answer is quality service. 
Today's networks can offer different levels of quality service, which include specifications for a maximum delay and minimum throughput. Quality service or QoS requirements in terms of the maximum allowed delay jitter for such applications.  Quality of Service is the set of techniques to manage network resources.
7 0
4 years ago
Read 2 more answers
Other questions:
  • Your team is creating web pages for the company intranet. some of the pages include advanced technologies, so you need to ensure
    13·1 answer
  • 2. Because technology is always changing, there are new applications being developed constantly. (1 point)
    9·2 answers
  • What is the program that searches through data bases?
    10·1 answer
  • What are table buffers?
    10·1 answer
  • Which option is used to apply formatting to multiple objects on a single slide while still maintaining the ability to manage the
    14·2 answers
  • Alice has 1/5 as many miniature cars as Sylvester has slyvester has 35 miniature cats how many miniature cars dose Alice have
    10·1 answer
  • What is the systems development life cycle (SDLC)? Group of answer choices Involves establishing a high-level plan of the intend
    8·1 answer
  • How many sections of a job description are there
    5·1 answer
  • What other viruses, Trojans, worms, or malicious software were identified and quarantined by AVG within the Virus Vault
    6·1 answer
  • ________ programs help solve the problem of running out of storage space by providing lists of application programs, stored vide
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!