1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anvisha [2.4K]
3 years ago
10

A(n) __________ item is a hardware or software item that is to be modified and revised throughout its life cycle

Computers and Technology
1 answer:
Anni [7]3 years ago
5 0

Answer:

"Configuration " is the correct approach.

Explanation:

  • A configuration element seems to be a device part that can then be defined mostly as a self-contained unit providing monitoring including acknowledgment of changes.
  • In several other terms, time series modeling as well as the configuration element authentication codes continue to distinguish configuration objects particularly.
You might be interested in
How can we get the number of records or rows in a table using MySQL? *
luda_lava [24]

The number of records or rows in a table using MySQL can be got by using the COUNT statement.

Explanation:

  • To counts all of the rows in a table, whether they contain NULL values or not, use COUNT
  • That form of the COUNT() function basically returns the number of rows in a result set returned by a SELECT statement
  • The SQL COUNT() function returns the number of rows in a table satisfying the criteria specified in the WHERE clause.
  • It sets the number of rows or non NULL column values.
  • COUNT() returns 0 if there were no matching rows.
  • The SQL COUNT function is an aggregate function that returns the number of rows returned by a query. You can use the COUNT function in the SELECT statement to get the number of employees, the number of employees in each department, the number of employees who hold a specific job, etc.
3 0
3 years ago
Write the program to solve quadratic equations, but if the discriminant is negative, output
Firdavs [7]

Answer:

PROGRAM  QuadraticEquation Solver

  IMPLICIT  NONE

REAL :: a, b, c ;

  REA :: d ;

  REAL  :: root1, root2 ;

//read in the coefficients a, b and c

  READ(*,*)    a, b, c  

  WRITE(*,*)   'a = ', a

  WRITE(*,*)   'b = ', b

  WRITE(*,*)    'c = ', c

  WRITE(*,*)

// computing the square root of discriminant d

  d = b*b - 4.0*a*c

  IF (d >= 0.0) THEN              //checking if it is solvable?

     d     = SQRT(d)

     root1 = (-b + d)/(2.0*a)     // first root

     root2 = (-b - d)/(2.0*a)     // second root

     WRITE(*,*)  'Roots are ', root1, ' and ', root2

  ELSE                            //complex roots

     WRITE(*,*)  'There is no real roots!'

     WRITE(*,*)  'Discriminant = ', d

  END IF

END PROGRAM  QuadraticEquationSolver

8 0
4 years ago
Dereck works for long hours on his computer. He frequently experiences physical strain by the end of the day because he does not
rjkz [21]
<span>keeping hands and wrists straight while typing</span>
3 0
3 years ago
Read 2 more answers
Which of the following declares an abstract method in an abstract Java class?
slava [35]

The option that declares an abstract method in an abstract Java class is  option(B.) public abstract void method().

<h3>In Java, are abstract methods compatible with abstract classes?</h3>

Class and method abstraction is when Objects cannot be created using the abstract class, which is a restricted class. In addition to not having a body, an abstract method is only applicable to abstract classes. Subclasses provide the body.

Hence, consists of only the method definition and not any implementation. An Abstract Method is a method that doesn't have a body. A class that is abstract must declare it. Due to the need for the abstract class to implement each abstract method, the abstract method can never be considered final.

Learn more about abstract method from

brainly.com/question/15684705
#SPJ1

8 0
2 years ago
PLEASE HELP ASAP I WILL GIVE BRAINLIEST TO CORRECT ANSWER
salantis [7]
The correct answer is letter b
8 0
3 years ago
Read 2 more answers
Other questions:
  • Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing pra
    10·1 answer
  • There are only three active stations in a slotted aloha network: a, b, andc. each station generates a frame in a time slot with
    15·1 answer
  • There are n coins, each showing either heads or tails. We would like all the coins to show the same face. What is the minimum nu
    6·1 answer
  • In Scheme, source code is data. Every non-atomic expression is written as a Scheme list, so we can write procedures that manipul
    8·1 answer
  • If you get a flat tire on the side of the road, what do you do.
    6·1 answer
  • Please help me I need a help
    13·1 answer
  • 1. Who was able to complete the puzzle the fastest in Trial 1?
    15·1 answer
  • Define the term algorithm and describe how programmers use algorithms when designing a program.
    8·1 answer
  • Answered
    10·1 answer
  • Write a Python program called wdcount.py which uses a dictionary to count the number of occurrences of each word (ignoring case)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!