1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
10

Using Gen/Spec, classes can be organized by using a peer-to-peer inheritanc True/false

Computers and Technology
1 answer:
Fiesta28 [93]3 years ago
5 0

Answer: True

Explanation: Gen/Spec is the known as the general specification standard for the classes.This standard helps in bringing out the peer-to-peer relations of class.

Gen/Spec is used in class diagram because it helps in the display of the access sharing and class specification in the general form for the required instances.Thus, this standard helps in the enhancement of the class diagram and its inheritance. So, the statement given in the question is true.

You might be interested in
Visual Design includes 4 elements: shapes, texture, lines and form.
Alexxx [7]

Answer:

Explanation:

The answer is false

Because the 4 elements are shapes texture colour and size

6 0
3 years ago
_____ CRM systems are hosted by an external vendor in the vendor's data center.
PtichkaEL [24]

Answer: On- demand

Explanation:

 On demand CRM system are basically hosted by the external vendor in the vendor data center. CRM is basically stand for customer relationship management.

CRM is a strategy that are used for managing the organisation relationship with the customers.

On demand CRM define as software availability for the customers. It basically connected with the idea of software on demand. The software are modify according to the current requirement and demand.

8 0
3 years ago
Briefly describe the working of computer processing system?
liberstina [14]

Answer:

<em>The Processor</em>

<em>The central processing unit (CPU) guides the computer through the various steps of solving a problem. Data enters the computer through an input unit, is processed by the central processing unit, and is then made available to the user through an output unit.</em>

<em>ExplanationExplanationExplanation:</em>

<em />

5 0
2 years ago
   In the Start menu of Windows 7, you see your name listed as an option. Where does this shortcut lead if you select it?
ss7ja [257]
I do believe the answer is c. I used to own a computer with a windows 7 program.

5 0
4 years ago
1. Our Systems are Microsoft Dynamics OLTP, we move data from the Source Systems through Staging to a Data Warehouse. Our report
zmey [24]

Answer:

1. More access to data

2.convenience

3. Easy creation of BI solutions

4. Report creation

5. Saves time

Explanation:

A data warehouse can be described to be an electronic storage system that contains large amount of facts and information which sources for and also maintains data from different sources; either external or internal.

The most important reason for a data warehouse is for it to store great amounts of data to be used for query and also to be used for analysis.

Why do we use a data warehouse?

1. Users have more access to data due to the integration of various sources of data. It makes use of real time data facts

2. You can conveniently store and also create metadata

3. Business intelligence solutions can easily be created using data warehouses.

4. Users can easily create their own reports

5. Data warehouses makes accessing different data sets faster. It is a time saver as business users are not going to spend time trying to retrieve data from various sources.

4 0
3 years ago
Other questions:
  • Which of these is an on-site metric for social media marketing?
    13·1 answer
  • Host to IP address lookup and its reverse lookup option are very important network services for any size network. It is also how
    14·1 answer
  • A professor is working with five teams in his marketing research class. He decides to experiment with path-goal theory in helpin
    11·1 answer
  • Benching system are prohibited in
    5·1 answer
  • Hai<br> ill give 100 point if some won answers dis
    14·2 answers
  • Compare and contrast two fundamental security design principles in network security. Analyze how these principles and how they i
    15·1 answer
  • B. Some of Company X's new practices and systems are unethical. Business ethics is a set of codes
    5·1 answer
  • Monster Collector
    7·1 answer
  • Hola, alguien aquí me podría ayudar dándome ideas a cerca de office (Word, PowerPoint o Excel) estoy desesperada no puedo pensar
    11·1 answer
  • Did you know a security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer sy
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!