1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr_godi [17]
4 years ago
5

How can development in ICT be utilized to speed up the development and integration efforts

Computers and Technology
1 answer:
maw [93]4 years ago
7 0

Answer:

Explanation:

1.  Sustainability and scale

2.  Lack of knowledge

 

3. Pace of change

4.  Funding

5. Changing roles and norms

You might be interested in
. Briefly describe an SQL DML statement for changing existing data in a table.
bearhunter [10]

Answer:

The Update statement in the DML is used for changing existing data in a table.

Explanation:

Their are following Sql statement in the DML.

Insert

This SQL statement is used for inserting data into the table.

select

This SQL statement is used for retrieving data from database  

update

This SQL statement is used for updating data in a table.

delete

This SQL statement is used for delete data from database .

The "UPDATE" SQL statement in DML is used for Modify the data in the existing table .

Following are the syntax of Update SQL query

Update tablename

set column1=value1,column2=value2............column N=valueN

Where condition;

Example :Suppose we have student table and (rollno,name,age and add) are the field for that table we have to change the address of rollno 105

Then we use update query like that

UPDATE STUDENT

SET add='kalam nagar'

where rollno=105;

8 0
3 years ago
Identify the programmer’s responsibility in maximizing the programs reliability by having awareness of the beneficial and harmfu
trapecia [35]

Programmers can maximize the reliability of their programs by means of functional analysis.

The form in which programmers can <em>maximize</em> the reliability of their programs in accordance with the awareness of the beneficial and harmful impact on society, economies and cultures is how well they did processes of functional analyses, in which they investigate on market and client needs and derive <em>functional</em> and <em>non-functional</em> parameters, which define the scope and characteristics of the program.

A good functional analysis has an influence of about 80 % on success of programs on fulfilling existing needs and solving existing problems with a <em>reasonable</em> efforts.

We kindly invite to check this question on functional analysis: brainly.com/question/23731043

8 0
3 years ago
Lesson 3: Wrapping Up Unit 6
GrogVix [38]

Answer:

A visual representation of colors arranged according to their hues, or the chromatic relation they share

Explanation:

7 0
3 years ago
Read 2 more answers
While going through the network log, Sarah, a network security administrator, noticed substantial outbound network traffic. Whic
VladimirAG [237]

The activity Sarah, a network security administrator, performed by going through a network log and then noticing substantial outbound network traffic is: indicators of compromise (IOC).

Cybersecurity refers to the preventive practice adopted for the protection of computers, software applications (programs), servers, networks, and data from unauthorized access, attack, potential theft, or damage, through the use;

  • A body of technology.
  • Processes.
  • Frameworks.
  • Policies.
  • Network engineers.

In Cybersecurity, it is very important to adopt certain security standards, policies, frameworks, technology, antivirus utility, and best practices, in order to achieve the following:

I. Prevent data theft and data corruption by malwares (viruses).

II. Enhance data integrity and secure (protect) data.

III. Mitigate any unauthorized access or usage of the system network by a hacker.

In conclusion, the indicators of compromise (IOC) refers to the factual evidence on a network device pointing to a security breach or data theft.

Read more: brainly.com/question/24112967

8 0
3 years ago
In a submarine battle simulation, you know all the locations the enemy units can move to. Anticipating these moves, you call for
BaLLatris [955]

Answer:

perfect information

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • What does xhtml stand for?
    5·2 answers
  • ________ is a set of rules for exchanging files such as text, graphic images, sound, video, and other multimedia files on the we
    14·1 answer
  • Which tool allows multiple users to dynamically update a document at the same time? Question 3 options: Google Docs OneDrive Exc
    14·1 answer
  • When searching for an image on your computer, you should look for a file with which of the following extensions?
    8·1 answer
  • Explain one way in which programmers may get hired.
    9·1 answer
  • Mobile apps are replacing the old__________<br><br>​
    7·2 answers
  • What is the best approach to testing a website? visit all pages to verify that they load visit every page and verify all links v
    7·1 answer
  • 0111101101010110101110110001001011101001011101101010101010110101
    14·1 answer
  • Write the use of these computers.
    14·1 answer
  • _____ refers to the programs that a device can run.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!