1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sashaice [31]
3 years ago
12

 What should every Software Engineer know about Software Architecture? ” ??

Computers and Technology
1 answer:
Llana [10]3 years ago
7 0
<span>Answer: -Software architecture isn't about big design up front; -Every software team needs to consider software architecture; -The software architecture role is about coding, coaching and collaboration; -You don't need to use UML; -A good software architecture enables agility.</span>
You might be interested in
Taking a group of recipes and identifying the similarities is an example of _____.
drek231 [11]

Answer:

Pattern recognition

Explanation:

Y not

4 0
2 years ago
How can I code this in Python with only if-statements? (Only allowed to use the built-in functions int(), float(), and str().)
yan [13]

str)float)sorry dont know

5 0
3 years ago
Brian has been working for a few years now and has saved a substantial amount of money. He now wants to invest 50 percent of his
babunello [35]
It should be Money market or CD. I'm leaning towards Money Market account.
8 0
3 years ago
Read 2 more answers
Which one of these do you need to become president of the US ?
gladu [14]

Answer:

Tbh i dont even know

Explanation:

I had who i wanted to become president but i don't even know anymore

7 0
2 years ago
Read 2 more answers
The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
lukranit [14]

Answer:

Encryption

Explanation:

Encryption is a term in the field of computer security (Cryptology) this is a process of encoding information in a way that hackers and eavesdroppers cannot read. The process of encryption involves a plain text (message) been converted into a scrambled text (cipher text) with an encryption algorithm (key) in this way, if the message is intercepted by a hacker he/she is unable to read the contents. Only the authorized party with a decryption key will be able to decrypt back to a plain text and read the contents of the message

3 0
3 years ago
Other questions:
  • • Two advertisers A and B
    8·1 answer
  • Customizing ads to people who had earlier visited the site is
    14·1 answer
  • Along a road lies a odd number of stones placed at intervals of 10 metres. These stones have to be assembled around the middle s
    12·1 answer
  • Divide 111001 by 1101​
    7·1 answer
  • In which of the following phases of filmmaking would a production team be focused on the
    10·2 answers
  • How many clients has<br> Accenture engaged globally on blockchain?
    12·1 answer
  • To reduce the potential for repetitive stress injury you should use proper?
    6·1 answer
  • Visit on social networking site and look for the site's privacy policy.The link is typically found at the bottom of the page and
    9·1 answer
  • Write a method named addCommas that accepts a string representing a number and returns a new string with a comma at every third
    10·1 answer
  • What is a phone made out of dna
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!