1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet [91]
4 years ago
10

What every software engineer should know about software architecture?

Computers and Technology
1 answer:
Natasha_Volkova [10]4 years ago
4 0
<span>Every software engineer should be aware of not only what a system does but the quality of work that it delivers and if it fits the situations and the expectations. It concerns itself with designing the solutions that address quality attributes or what is nonfunctional requirements.</span>
You might be interested in
Wyjaśnij w jaki sposób wykonuje się nitowanie zakładkowe i nakładkowe, oraz wyjaśnij na czym polega pasowanie mieszane.
Ksenya-84 [330]

Answer:

????

Explanation:

i dont speak this language

7 0
3 years ago
I need answer for this urgent plsdsss
Lilit [14]

Answer:

Receiver

Explanation:

bcz the private key is kept only by the receiver of the message.

3 0
3 years ago
Read 2 more answers
Write a SELECT statement without a FROM clause that uses the NOW function to create a row with these columns: today_unformatted
OlgaM077 [116]

Answer:

SELECT

NOW() AS 'today_unformatted',

DATE_FORMAT(NOW(), '%d-%b-%Y') AS 'today_formatted';

Explanation:

%d represents date.

%b represents month.

%Y represents year.

5 0
3 years ago
Richard is shopping online and has to enter a password to access his bank account. Which method attribute will securely submit h
kotykmax [81]

Answer:

password

Explanation:

It is certainly the password method attribute, and this can enable Richard to securely submit the credentials. If we set the method attribute or input type as a password, then the password is sent in the encrypted form, and it remains secure. And hence, the password cannot be copied by anybody, and it remains safe. This is the characteristic of a secure web form. And remember we are dealing with an HTML form.

6 0
3 years ago
Read 2 more answers
5. Bits are sent over a communications channel in packets of 12. (a) If the probability of a bit being corrupted over this chann
user100 [1]

Answer:

0.889

Explanation:

7 0
4 years ago
Other questions:
  • What are three settings that are available in the Properties dialog box of a message?
    9·2 answers
  • Two floating point numbers, A and B, are passed to a recursive subroutine.
    11·1 answer
  • In a virtual memory system, each process must have its own page table.(True or False?)
    13·1 answer
  • The Android operating system was invented by ______.
    13·1 answer
  • A user complains that her computer is performing slowly. She tells you the problem started about a week ago when new database so
    12·1 answer
  • is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions
    7·1 answer
  • Fix the two words that are used incorrectly.
    10·2 answers
  • write a program that inserts on the p position of a string read from the keyboard also another string read from the keyboard
    11·1 answer
  • Write a C program that reads two hexadecimal values from the keyboard and then stores the two values into two variables of type
    15·1 answer
  • What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!