1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valina [46]
3 years ago
14

Betty is applying for a software analyst role. which field should she specialize in? information technology resource management

marketing finance
Computers and Technology
2 answers:
taurus [48]3 years ago
8 0

Answer:

The correct answer to the following question will be "Information Technology".

Explanation:

This IT would be characterized as the analysis and the use of computing device and telecommunications applications to store, retrieve, and transmit data and information.

Betty's position as such an expert for applications will be to:

  • Research domain implementations for the program.
  • Start preparing documentation related to device standards and specifications.
  • Become the connection between certain consumers of the app as well as the developers.

Schach [20]3 years ago
5 0
Since Betty is applying for a software analyst role, she should specialize in INFORMATION TECHNOLOGY.

<span>Information technology or IT is defined as the study or use of systems in computers and telecommunications for storing, retrieving, and sending information.
</span>
Betty's role as a software analyst  would be to:
1) <span> study the </span>software<span> application domain,
2) prepare </span>software<span> requirements and specification (</span>Software<span> Requirements Specification) documents.
3) be the link between the software users and software developers.</span>
You might be interested in
Phil wants to make a dark themed superhero movie. What could be his target demographic
maria [59]

Answer:

d

Explanation:

i think, because it makes the most sense to me.

5 0
2 years ago
Read 2 more answers
A personal career profile for can be used to match what you know about yourself to what you know about different careers
mel-nik [20]

Answer:

B

Explanation:

give answers next time pls so i can help you!!

3 0
3 years ago
Read 2 more answers
Image files are grouped into two categories: _____.
EleoNora [17]
It is grouped according to raster and vector format. Raster format are images used in a computer or printed. Vector format stores data and is compressed. 

Examples of common raster formats usually used in a computer are; jpeg, png, bitmap, and gif. Vector formats are; CGM, SVG and 3D vector.
4 0
3 years ago
Before a program written in c can be executed on a computer, what step is required to be done first?
sergejj [24]
It should be compiled. It won't work if it's not compiled.
6 0
3 years ago
These tools gather information from sources such as emails, text messages, and tweets and make the information instantly and pub
babunello [35]

Answer:

Crisis-Mapping

Explanation:

Social networks are characterized by the immediacy of the content that users produce, and that same feature can be transferred to the online mapping of crises and conflicts.

Characteristics Crisis-Mapping:

  • Real-time information processing.
  • Immediacy;
  • Visualization of the aggregated information can allow the detection of patterns that cause new analyzes to be undertaken or work hypothesis to verify.
  • Continuity in the tasks, the maps record activity without interruption during the twenty-four hours of the day and seven days per week.
  • Flexibility in the protocols, since the tasks are distributed and evolve according to the dynamics (the crisis maps evolve with the crisis itself).
8 0
3 years ago
Other questions:
  • MD5 uses a hash value to create a hash which is typically a 32 character hex number and how many bits?
    11·1 answer
  • What component has the job of managing data as it flows into and out of the places it needs to go?
    11·2 answers
  • What cable should i be using to connect my android tablet to the pc?
    13·2 answers
  • ________ gives its approval to U.S. e-commerce websites that follow strict privacy standards, such as explaining to visitors how
    6·1 answer
  • How can you remove heat from a computer?
    10·1 answer
  • In the 1880’s advancements in technology and processes made photography available to the general public. Who is considered the m
    12·1 answer
  • Next, Kim decides to include a diagram of a frog’s life cycle in her presentation. She wants to use an image that is part of a p
    15·2 answers
  • if a user has one column in a table and would like to make it into two columns which command should be used
    13·1 answer
  • An MP3 player is an example of which of the following types of computer
    5·1 answer
  • Help PLEASE ILL MARK as brainlest
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!