1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sashaice [31]
3 years ago
12

 What should every Software Engineer know about Software Architecture? ” ??

Computers and Technology
1 answer:
Llana [10]3 years ago
7 0
<span>Answer: -Software architecture isn't about big design up front; -Every software team needs to consider software architecture; -The software architecture role is about coding, coaching and collaboration; -You don't need to use UML; -A good software architecture enables agility.</span>
You might be interested in
PYTHON ERROR, PLEASE HELP I'LL GIVE BRAINLIEST TO WHOEVER HELPSSSS
cricket20 [7]
U put too many brackets on the second to last line at the end
6 0
3 years ago
Discuss the advantages of Database approach to systemdevelopment
Sergeu [11.5K]

Answer:

Explained

Explanation:

Improved Data Sharing and Data Security

Proper database management systems help increase organizational accessibility to data, which in turn helps the end users share the data quickly and effectively across the organization.  A management system helps get quick solutions to database queries, thus making data access faster and more accurate.

Effective Data Integration

Implementing a data management system enhances an integrated picture of an organization’s operations. It becomes easy to see how processes in one segment of the organization affect other segments.

Increased productivity of end user

Deploying a database management system, will always result in the increased productivity of users.It empowers the end user to make well informed and quick decisions that can contribute in success and failure of any organization.

4 0
3 years ago
Computer science question down below
Pachacha [2.7K]

It would be A

Explanation:

6 0
3 years ago
Read 2 more answers
The Wired Equivalent Privacy standard had what significant disadvantage?
Ivanshal [37]

Answer:

Wired equivalent privacy standard has the significant disadvantages as, it is uses the static encryption keys. Wired equivalent privacy are the security and the privacy protocol which are used for designing the wireless local area network. And the static encryption key are used to set up the router for encrypting the packet in the device. The main disadvantage is that it enables the MAC address and it is easily detectable by the hackers.  

 

6 0
3 years ago
Read 2 more answers
Given a pattern as the first argument and a string of blobs split by | show the number of times the pattern is present in each b
Ierofanga [76]

Answer:

The code is below

Explanation:

import java.io.BufferedReader;

import java.io.IOException;

import java.io.InputStreamReader;

import java.nio.charset.StandardCharsets;

public class Main {

  /**

  *

  * Iterate through each line of input.

  *

  */

  public static void main(String[] args) throws IOException {

      InputStreamReader reader = new InputStreamReader(System.in, StandardCharsets.UTF_8);

      BufferedReader in = new BufferedReader(reader);

      String line;

      while ((line = in.readLine()) != null) {

          String[] splittedInput = line.split(";");

          String pattern = splittedInput[0];

          String blobs = splittedInput[1];

          Main.doSomething(pattern, blobs);

      }

  }

  public static void doSomething(String pattern, String blobs) {

      // Write your code here. Feel free to create more methods and/or classes

      int sum = 0;

      String arrblobs[] = blobs.split("\\|");

      for (int i = 0; i < arrblobs.length; ++i) {

          int answer = 0, index = 0;

          for (;;) {

              int position = arrblobs[i].indexOf(pattern, index);

              if (position < 0)

                  break;

              answer++;

              index = position + 1;

          }

          System.out.print(answer + "|");

         

          sum = sum + answer;

      }

      System.out.println(sum);

  }

}

5 0
3 years ago
Other questions:
  • ​________ establishes a connection between the​ computers, sequences the transfer of​ packets, and acknowledges the packets sent
    11·1 answer
  • Positive and negative points of Computer and Information Systems Managers
    14·1 answer
  • Does Android have text-to-voice?
    11·1 answer
  • How does white balancing affect the images recorded by a camera?
    15·1 answer
  • Your grandmother was an established artist and left you several original paintings after she died. Which of these statements is
    11·1 answer
  • What specific record type is found in every zone and contains information that identifies the server primarily responsible for t
    10·1 answer
  • Top-down programming divides a very large or complex programming task into smaller, more manageable chunks.
    8·1 answer
  • If cost of 1 kg sugar is 36 find price of 3 kg sugar​
    8·1 answer
  • Why are abbreviations like BRB, TBH, and IDK appropriate in some situations but not in others?
    14·2 answers
  • Which language should you use to add functionality to web pages?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!