1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
3 years ago
11

In a typical system design specification, the _____ section describes the constraints, or conditions, affecting a system, includ

ing any requirements that involve operations, hardware, systems software, or security.
a. Time and Cost Estimates
b. System Environment
c. Executive Summary
d. System Components
Computers and Technology
1 answer:
Lapatulllka [165]3 years ago
6 0

Answer:

The answer is "Option B".

Explanation:

The system environment includes all software external areas, which may vary from user to user. The System may be different, but it is part of the System environment, depending on the level of available memory. This environment is a part of the System development life cycle. and other options that are not correct which can be described as follows:

  • In option a, Time and cost estimates are part of the SDLC. It is a part where we calculate the overall cost and time for making any new software.
  • In option c, It is not a use in system environment it is reported.
  • In option d, System Components are a hardware device that by system environment for making a system environment but it does not include systems security that's why it is not correct.
You might be interested in
A derived class has access to __________.
Kitty [74]

Answer:

Option a is the correct answer for the above question

Explanation:

The derived class is a class that inherits the property of the base class, and he can access the public variable and function or members of the base class or ancestor class.

Option 'a' also states the same and the question asked about the assessment of the derived class. Hence option a is the correct answer while the other is not because:-

  • Option b states about the private members, but it is not accessible by the derived class.
  • Option c states about the derived class members but it can also access the base class members.
  • Option d none of the above, but option a is the correct answer.

5 0
4 years ago
When you add a zero to the right of a decimal number, it multiplies its value by 10 (For example, "15" becomes "150"). What simi
My name is Ann [436]

Answer:

When you put a 0 on the right side of a binary number it multiplies it by 2

Explanation:

6 0
3 years ago
Which type of boot authentciation is more secure?
xeze [42]
The correct answer would b (C) because all the other ones are not on the list
7 0
3 years ago
For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which fe
sattari [20]

Answer: See explanation

Explanation:

Since we are given the information that Annie added the picture of a fruit in a document and wants to enhance it to give a cut-out, she can enhance her document's look by using clip art.

Clips art are simply used for designing and can be used in the illustration of a medium. In this case, the clip art can like a bitmap graphics which typically have a limited quality.

3 0
3 years ago
Read 2 more answers
Which of the following is true about the Purpose of the Page and the Page Quality (PQ) rating? Select all that apply. True False
aleksandr82 [10.1K]

Answer:

Explanation:

Harmful or malicious pages should always get a page quality (PQ) rating of Lowest. True

Pages with an informational or educational purpose should always be given higher page quality (PQ) ratings than entertainment or gossip pages. False

There is no relationship between the purpose of the page and the page quality (PQ) rating. False

If you cannot determine the purpose of the page after extensive effort, the page quality (PQ) rating should be Lowest. True

7 0
3 years ago
Other questions:
  • (True or False)
    8·2 answers
  • To include an online picture in a publication, navigate to the _____ tab.
    7·1 answer
  • A polyalphabetic cipher uses many ___
    6·1 answer
  • Select the term used to describe the process, within the context of Active Directory, that allows a person with higher security
    5·1 answer
  • HELP I WILL MARK BRAINLIEST!!! I NEED ASAP!!!
    5·1 answer
  • How does the OS make multitasking possible?
    12·2 answers
  • How to shutdow computer
    7·1 answer
  • Which of these is true about moores law
    6·1 answer
  • What validation type would you use to check that numbers fell within a certain range? a) range check b)presence check c)check di
    9·1 answer
  • Your task is to design a method int[] allMatches(int[] values, int size, int a, int b) that returns all values between a and b i
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!