1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexgriva [62]
3 years ago
12

What are the basic characteristics of object-oriented analysis and design (OOAD)? How does OOAD compare to structured analysis a

nd design (SAD)?
Computers and Technology
1 answer:
juin [17]3 years ago
7 0

Answer:

Basic characteristics of OOAD and compression with SAD can be defined as follows:

Explanation:

The Object-oriented analysis is described as a design and analysis system like an application, that uses Oops programming. It is the measurement model, that is the presentation, which became a part of the object-based review.  

The features of OOAD can be defined as follows.  

  • The complex issues are simply solved.    
  • The operation of very fast recovery.  
  • The stability in condition changes.
  • Its conceptual method for resolving its extremely complex problems.

The difference in OOAD and SAD can be defined as follows:

  • The OOAD mainly focuses upon the design of objects, it can be used in highly complex logical systems, whereas the SAD focuses on data analysis systems and processes.  
  • The OOAD uses the framework to target data, but the SAD is process-oriented. It uses class and UML diagrams, but SSAD uses DFDs to extract the element, it has many limited steps to prepare and execute, but OOAD relies mostly on initial growth. This method is being developed in the course of the process.
You might be interested in
What project started the development of inter-network connections using tcp/ip that has evolved into the internet today.?
rosijanka [135]
Dial Up, help start it
3 0
4 years ago
Surprisingly, many of us may be unknowing victims of botnets. Because of the rising sophistication of botnet schemes, your compu
Virty [35]

Answer:

a. Simple rules

1. Upgrade your operating system

2. Upgrade your softwares regularly

3. Upgrade your browser when new additions are available

4. Change your password very often

b. Suspensious signs

1. The operating system and programs take a longer while to start up.

2. It shows lack of storage space despite having space

3. The PC crashes regularly

4. If the sent mails are received as spam

5. The hard disk is working excessively while no programs are currently running

C. All the part of a security incident should be logged.

Explanation:

a. Simple rules

1. Upgrade your operating system

2. Upgrade your softwares regularly

3. Upgrade your browser when new additions are available

4. Change your password very often

b. Suspensious signs

1. The operating system and programs take a longer while to start up.

2. It shows lack of storage space despite having space

3. The PC crashes regularly

4. If the sent mails are received as spam

5. The hard disk is working excessively while no programs are currently running

Explanation:

C. All the part of a security incident should be logged.

7 0
3 years ago
An intruder can wreak havoc on a network by simply plugging in an infected USB flash drive.
Bas_tet [7]

Answer:

A. True

Explanation:

1. I took the test

2. Flash drive ports are connected to the rest of the computer, so putting in an infected flash drive into the port will cause the bug to spread throughout the whole device.

3 0
2 years ago
DSSS uses a chipping code to encode redundant data into the modulated signal. Which two of the following are examples of chippin
Schach [20]

Answer:

Option A and Option D

Explanation:

5 0
4 years ago
Advantages of communications​
poizon [28]

Answer:

promotes team building

creates better relationship

3 0
3 years ago
Read 2 more answers
Other questions:
  • 1. Which of the following are considered CAD powerhouses?
    6·1 answer
  • What is the basic unit for storing data in exel
    10·1 answer
  • When a private network uses a single public ip address, and each outgoing tcp packet uses a different port to allow for proper t
    15·1 answer
  • What are the two reasons we analyze algorithims
    7·1 answer
  • Answer to this if you have apex legends on either pc xbox one or PS4 for the one that answers and does gets brainliest please do
    11·2 answers
  • Which quality allows programmers to modify a program as and when required
    11·2 answers
  • The time a computer takes to start has increased dramatically, one possible explanation for this is that the computer is running
    6·1 answer
  • Why security must be planned, tested, and ready by the time the erp implementation is at go-live?
    11·1 answer
  • Winners announced tomorrow when I check results ngl I gtg to sleep soon I should see a lot of people tomorrow ^^
    8·1 answer
  • Create a new class MyArray_DE and copy and paste the previous program. Be sure to rename the class to MyArray_DE. Modify the pro
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!