1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
padilas [110]
3 years ago
14

The _____ approach treats process and data independently and is a sequential approach that requires completing the analysis befo

re beginning the design of information systems. a. joint application design b. class-responsibility collaboration c. object-oriented d. structured systems analysis and design
Computers and Technology
1 answer:
Solnce55 [7]3 years ago
4 0

Answer:

C. Object Oriented

Explanation:

In Object Oriented approach to development of information systems, processes and data are handled independently and could be tested as separate modules before the actual development begin.

Hope this helps!

You might be interested in
Martha pays $3,335 every month for her house payment. She has made 86 payments up till now. How much has Martha paid for her hou
kotegsom [21]

Answer:

286810

Explanation:

86*3335=286810

8 0
3 years ago
What type of security solution provides a hardware platform for the storage and management of encryption keys?
shutvik [7]

The type of security solution provides a hardware platform for the storage and management of encryption keys exists hardware security modules .

Hardware security modules (HSMs) supply an effective method to control encryption keys.

<h3>What are Hardware security modules?</h3>

A hardware security module (HSM) exists as a physical machine that supplies extra security for sensitive data. This kind of device exists utilized to require cryptographic keys for essential functions such as encryption, decryption, and authentication for the usage of applications, identities, and databases.

The hardware usually costs at least USD 20,000 to deploy, USD 40,000 for increased accessibility, and multiple periods better for normal enterprise deployment.

Hardware Security Modules (HSMs) exist in hardened, tamper-resistant hardware appliances that strengthen encryption techniques by developing keys, encrypting and decrypting data, and designing and demonstrating digital signatures.

A Hardware Security Module (HSM) exists as a hardware-based protection appliance that develops, stores, and protects cryptographic keys. Sterling Secure Proxy utilizes keys and certificates stored in its store or on an HSM.

To learn more about Hardware Security Module refer to:

brainly.com/question/24118720

#SPJ4

7 0
2 years ago
Does anyone want to play nitro type with me for my typing class I put 100 points into this so If you put link or random stuff I
Tju [1.3M]

Answer:

okay

so what is it what is your question..

7 0
3 years ago
PLEASE HELP I NEED TO CHECK MY ANSWER ASAPPP
Vadim26 [7]

Functions are code segments that are executed when called or invoked

The function definition is not given; so, the output of the program cannot be outrightly determined.

However, the following are the possible scenarios.

  • The program would return 35.55 if the 2 represents the digits after decimal.
  • The program would return 36 if the 2 represents the significant digits.

It is unlikely for the program to return (a) 35.555 and (d) 40

Read more about functions at:

brainly.com/question/14284563

5 0
2 years ago
Kenny has gone to a rocky beach to take a photo of the sunset. He wants to level his shot perfectly. He is aware that his tripod
iragen [17]

Answer:

it would probably be on the right side

Explanation:

3 0
4 years ago
Read 2 more answers
Other questions:
  • What is computer virus?
    8·1 answer
  • Which ethernet cabling standard defines an ethernet network that uses cat 3 or better utp cabling, operating at 10mbps?
    8·1 answer
  • 61. Select an activity of the Production Phase: a. a web authoring tool is often used b. the graphics, web pages, and other comp
    10·1 answer
  • How do you jumpstart a car in the middle of nowhere??? Explain using 2 paragraphs.
    14·2 answers
  • A(n) _________ website contains factual information, such as libraries, encyclopedias, dictionaries, guides, and other types of
    8·1 answer
  • An app builder wants to show groups as the last navigation menu item in the Salesforce1 mobile app. However, the app builder is
    8·1 answer
  • Write a C program that reads two hexadecimal values from the keyboard and then stores the two values into two variables of type
    15·1 answer
  • Which statement best describes a social impact of computing on the world?
    9·1 answer
  • PORFA AYUDAAAA DOY CORONA (solo si puedo) ES DE TECNOLOGÍA
    12·1 answer
  • Design an application for the Sublime Sandwich Shop. The user makes sandwich order choices from list boxes, and the application
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!