1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gayaneshka [121]
3 years ago
6

Michael Holliday is a business systems analyst who is working on a feasibility study for a new​ e-911 system for the city of Mem

phis. Which of the following phases is he working on as he determines if the system will provide a good return on investment for the​ city?
A. Testing
B. Design
C. Development
D. Requirements analysis
E. Planning
Computers and Technology
1 answer:
postnew [5]3 years ago
7 0

Answer:

E

Explanation:

The requirement analysis phase is a very key vital phase of the system life cycle in which a system designer sees the future result of his input in the system he intends to design, the requirement analysis clearly state the result of any system in progress design and proccess stage

You might be interested in
In which slot is a video card most commonly installed within a laptop?
lesya692 [45]

Answer:

PCIe

Explanation:

If we're talking about video slot the PCI is the most commonly installed in a laptop, but in this case, we have the PCIE or PCI-Express, this was the most common video slot in 2007 and is confused for the PCI-X.

We can increase the bandwidth with this video slot, this slot PCI-X could be 32 times faster than PCI 2.1, with PCIE 1.1 we can transport 250mb/s in each direction.

8 0
3 years ago
What hardware architectures are not supported by Red Hat?
frozen [14]
It should be Macintosh I hope this help let me know if you have any questions
6 0
3 years ago
What is a way that i can connect my Xbox360 to my computer?
Vladimir79 [104]
Its possible if you get the right cords like double ended usb cord and also it depends on what kind of model you have message me and ill tell you
8 0
3 years ago
Read 2 more answers
Replace any alphabetic character with '_' in 2-character string passCode. Ex: If passCode is "9a", output is: 9_
oksian1 [2.3K]

Answer:

if(isalpha(passCode[0]))

{

passCode[0] = '_';

}

if(isalpha(passCode[1]))

{

passCode[1] = '_';  

}

         

Explanation:

The first if statement uses isalpha() function which checks if the character passed in this function is an alphabet. If the character stored in 0-th position (which is the first position whose index is 0) of the variable passCode is an alphabet then it is replaced with the '_'

The next if statement checks if the second character in the passCode variable is an alphabet. This means the function isalpha() checks if the character stored in second position (index 1) of the variable passCode is an alphabet then it is replaced with the '_'

The  complete activity with this chunk of code added and the output is attached in a screen shot.

4 0
3 years ago
An operating system____a password for a given user, converting it into a representation that cannot be understood without the ap
Ierofanga [76]

An operating encrypts system a password for a given user, converting it into a representation that cannot be understood without the appropriate algorithm

3 encrypts

<u>Explanation:</u>

Normally end user login with user id account with password as login authorization or authentication to operate the system. There are some many technologies for login methods are used. Nowadays to login to operating system bio matric device is also been used.

In windows 10 pin also be used for login to operating systems. In Windows 10 operating system Hotmail accounts (clouds access also been used) so that related windows store or clipboard history are stores across the desktop and laptop.

Cracks: - some algorithm was used to crack password of login for operating system access.

Reverses- it a process or algorithm where reverse   password or example: - 1234 where password in reverse process 4321.

Encrypts:- A password is  encrypts with some calculation or string or some value. Cracking the password is used by using decrypts technology.

Decrypts is reverse logic applied based on encrypts technology.

6 0
3 years ago
Other questions:
  • Assume a 8x1 multiplexer’s data inputs have the following present values: i0=0, i1=0, i2=0, i3=0, i4=0, i5=1, i6=0, i7=0. What s
    8·1 answer
  • Write a recursive function, replace, that accepts a parameter containing a string value and returns another string value, the sa
    5·1 answer
  • Write a query to show the price reduced by 10% for all products that are tables or entertainment centers with a standard price g
    10·1 answer
  • You need to install an operating system on a computer that will be sharing files for the company employees. You estimate there w
    9·1 answer
  • _ models are non visual ways of communicating how someone thinks about something in the natural world
    12·1 answer
  • The function below tries to create a list of integers by reading them from a file. The file is expected to have a single integer
    5·1 answer
  • What is one advantage and disadvantage of designing a support security that might be based on a centralized model, where all sen
    11·1 answer
  • What will happen when you drag and drop a worksheet tab into another workbook WITHOUT holding the Ctrl key down?
    13·2 answers
  • Computer programming 5
    10·1 answer
  • What is the school wifi password trying to do my class work in school on different devices.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!