1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Finger [1]
3 years ago
13

What car Is this because I want it for my daughters sweet 16th birthday

Computers and Technology
1 answer:
nadezda [96]3 years ago
7 0
That is a 2016 Nissan Sentra
You might be interested in
Hi can someone help me make a like a song for music Class pls I attached an example of what i need.
g100num [7]

Answer:

i dont really like music so sorry i cant help i hope someone can help you with this.

8 0
3 years ago
In some video games, the player cannot obtain the reward without doing what with something that they already have?
Crank

Answer:

risking

Explanation:

8 0
2 years ago
General Hardware Products Your boss, the IT director, wants you to explain FDDs, BPM, DFDs, and UML to a group of company manage
Bas_tet [7]

Answer:

1. FDD is a process and Analysts can use a FDD to create and use business functions and processes. It Requirements models are used when gathering requirements for a new system.

2. BPM is used on an ongoing basis for business process improvement. It is meant to improve order, insight and efficiency of the collective workflows that make up any given business process. BPM is meant to reduce any chaos within those collective workflows that make up a process and eliminate ad hoc workflow management. BPM means Business Process Management.

3. DFDs stands for Data Flow Diagram which will help software developers and designers to understand how they can take their next step to fit into the overall business process. DFDs paly key role for a successful requirements modeling.

4. UML can be used for modeling a system independent of a platform language. UML is a graphical language for visualizing, specifying, constructing, and documenting information about software-intensive systems. UML gives a standard way to write a system model, covering conceptual ideas.

Explanation:

Functional decomposition diagram (FDD) is used to identify functions and define their structure. It is a technique to decompose the complex problem into manageable pieces or individual elements to develop the application or product.

DFDs: It contains a process (shape) that represents the system to model, in this case, the "Food Ordering System". It also shows the participants who will interact with the system, called the external entities. In this example, Supplier, Kitchen, Manager and Customer are the entities who will interact with the system.

Unified Modeling Language (UML): Edraw UML Diagram is the application of choice for many software engineers and designers. The software is fully compatible with 64 and 32-bit Windows platforms from Windows XP to Windows 10.

3 0
3 years ago
Which of the following statements is not correct ​
just olya [345]
Wich statements ? I don’t see anything
4 0
2 years ago
Read 2 more answers
What would the range(3, 9) function generate?
gregori [183]

Answer:

A, 3,6,9

is the answer

Explanation:

bc it count by

3 0
2 years ago
Other questions:
  • Bob received a message from Alice which she signed using a digital signature. Which key does Bob use to verify the signature?Gro
    13·1 answer
  • Microsoft has developed the Active Directory Domain structure so that a central authority, called the __________, is the reposit
    7·1 answer
  • To reduce chances of system failure, engineers may use _____ .
    10·2 answers
  • Spoken word and written word are different because what
    9·1 answer
  • Point out the correct statement.
    11·1 answer
  • A string with delimiters can be parsed into separate fields using the _____ class.
    8·1 answer
  • How did the use of ARPANET change computing?
    14·1 answer
  • When the narrator of "EPIC 2015" describes the year 2015 as the "worst of
    6·1 answer
  • The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext
    11·1 answer
  • Mavis is considering signing up for a hosted enterprise software solution for her small business. She recognizes that an advanta
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!