1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seraphim [82]
3 years ago
12

Priscilla is providing the junior analysts in her firm with some real-world illustrations to explain some of the recommendations

that they must be prepared to make to clients, based on what they have studied in their coursework, in order to solidify their understanding.Which is a reason why Priscilla would offer in-house software development?A) The client has a number of very distinctive security requirements.B) The client wants to be able to use fewer technical development staff members.C) The client is looking to spend the least possible time in implementation.D) The client wishes to receive future upgrades from the vendors.
Computers and Technology
1 answer:
Vlad [161]3 years ago
7 0

Answer:

The answer is letter A.

Explanation:

The client has a number of very distinctive security requirements.

Building a software  product using internal company's resources and inside the company is a good option if the client has the required technology and professionals available.

You might be interested in
Super Scores
Sindrei [870]

Answer:

Replace:

<em>//CODE HERE  </em>

<em>//output the max score for each section and compute & output total too.  </em>

with the following lines of codes:

<em>int num;  </em>

<em>for(int i=0; i<numtakes; i++) { </em>

<em>for(int j=0; j<numsections; j++) { </em>

<em>   cin>>num; </em>

<em>   if(num>maxScores[j]){ </em>

<em>       maxScores[j] = num;    } </em>

<em>}  } </em>

Explanation:

Your program is poorly formatted. (See attachment for correct presentation of question)

What's required of the us is to complete the source program.

The codes has been completed in the Answer section above, however, the line by line explanation is as follows:

<em />

<em>This line declares num that gets user for input for each entry</em>

<em>int num;  </em>

<em>This line iterates through the number of takes</em>

<em>for(int i=0; i<numtakes; i++) { </em>

<em>This line iterates through the number of sections</em>

<em>for(int j=0; j<numsections; j++) { </em>

<em>This gets user input for each entry</em>

<em>   cin>>num; </em>

<em>The following if condition determines the greatest entry in each section</em>

<em>   if(num>maxScores[j]){ </em>

<em>       maxScores[j] = num;    } </em>

<em>}  } </em>

<em>For further explanation, I've added the complete source file as an attachment where I used comments to explain each line.</em>

Download cpp
8 0
3 years ago
Requests to retrieve data written in a language such as SQL are called…
Oksanka [162]
B. Queries

Queries can be fairly broad or written to focus on time frames, types of data, ranges etc.
5 0
3 years ago
Which of the following defines guidelines that specify the way computers access the medium to which they are attached, the type(
Tatiana [17]

Answer:

(D) Network Standard.

Explanation:

Networking standards ensures the ability of networking technologies by defining the guidelines of communication that specify way computer access the medium they are attached.Network standards also defines which type of transmission transmission to use wireless or wired,which media to use etc.

5 0
3 years ago
Is there any website online to use android studio live?​
slavikrds [6]

Answer:

May bhe here

https://developer.android.com/studio/intro

Explanation:

5 0
3 years ago
In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
Ugo [173]

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

4 0
3 years ago
Other questions:
  • Software license infringement is also often called software __________.
    11·2 answers
  • What are some ways tables can be inserted into a document? Check all that apply.
    5·2 answers
  • What kind of energy transformation occurs in a gasoline-powered car?
    14·1 answer
  • What computer is designed to meet the computing needs of several people simultaneously in a small to medium-size business enviro
    5·1 answer
  • The birthday problem is as follows: given a group of n people in a room, what is the probability that two or more of them have t
    15·1 answer
  • An ____ is an object that produces each element of a container, such as a linked list, one element at a time.
    13·2 answers
  • I'm having trouble changing my google account password
    12·1 answer
  • Which scenarios are examples of students managing their time well? Check all that apply. A student studies while watching her fa
    8·2 answers
  • Using direct mapping, consider a 16-bit memory addresses, and a cache with 64 blocks, where each block is 8 bytes. What is the s
    8·1 answer
  • write code to print out all combinations of pairs of numbers 1 through m and 1 through n, separated by a comma
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!