1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gizmo_the_mogwai [7]
3 years ago
7

Week 3 Discussion Requirements Modeling Requirements modeling is one of the earlier phases of software development where require

ments are captured and analyzed. One area that is oſten overlooked is properly capturing non-functional requirements. After engaging in research discuss one non-functional requirement that is common among IT projects. Be sure to include in your answer why it's important, and what the issues might be if it is overlooked Avoic discussing non-functional requirements presented by classmates.​
Computers and Technology
2 answers:
steposvetlana [31]3 years ago
8 0
Soooooooooooooooooooooooooooo
iragen [17]3 years ago
3 0

i dont understand wha your asking

You might be interested in
What is the difference between a rendering engine and a browser engine?
Vlada [557]

Answer:

D) A rendering engine displays content on the screen and a browser engine coordinates user interface interactions.

Explanation:

The rendering engine will deal with all the HTML code and will generate an output based on its own rules for interpreting the code.  That's why different rendering engines will have different renditions of the same given HTML code. You can notice that in the acceptance of HTML5 and CSS3 tags, which are not universal yet.

The browser engine will deal with the user interface and all other features that make a browser a browser, relying on the rendering engine for the display.

That duality allows different browsers to use the same rendering engine, thus have similar outputs.

7 0
2 years ago
Read 2 more answers
What kind of device is a printer? output or input
ANEK [815]
A printer is output. :)
8 0
2 years ago
9 dmz, vpn, vlan where in the network do you place a dmx, why, what attacks are prevented? what does a vpn do, provide an exampl
creativ13 [48]

At the: Firewall, the DMZ is configured in the Organization. Within the firewalls, it is accessible. They have been completed with the intention of adding an additional layer of safety to the organization to protect it.

The DMZ safeguards not only the web server but also the remainder of the network. To allow visitors to the network to access the web server, a security breach must be made.

The DMZ lessens the possible risk caused by this gap. A secure network, protected by the FortiGate, that only permits access if it has been specifically authorized is known as a DMZ network (from the term "demilitarized zone").

In this illustration, a private subnet is used by the DMZ network, which permits access to a web server by internal and external users using distinct addresses while blocking access from the web server to the internal network in the case that the web server is compromised.

To know more about DMZ click on the link:

brainly.com/question/2920815

#SPJ4

7 0
1 year ago
What is missing link describe briefly with an example class 11?
allsm [11]

A missing link is a long-extinct organism that filled in a gap between closely related species that now coexist on Earth, such as between apes and humans or reptiles and birds.

A possible or recent transitional fossil is referred to as the "missing link." In the media and in popular science, it is widely used to describe any novel transitional form. Initially, the expression was used to describe a hypothetical transitional form that existed between anthropoid ancestors and anatomically modern humans. The term was influenced by both the pre-Darwinian evolutionary theory known as the Great Chain of Being and the now discredited notion that simple species are more primitive than sophisticated ones. Human evolutionary phylogenetic tree. Since evolutionary trees only hold information at their tips and nodes, and the rest is relied on conjecture rather than fossil evidence, geneticists have supported the idea of the "missing link." But anthropologists no longer like it because of what it suggests.

Learn more about missing link  from

brainly.com/question/1968231

#SPJ4

6 0
9 months ago
What type of information is appropriate for headers and footers? Check all that apply.
lbvjy [14]

Answer:

slide/page number

smart art

maybe date and time

Explanation:

6 0
2 years ago
Read 2 more answers
Other questions:
  • In modern computer memory, each location is normally composed of one byte.
    7·1 answer
  • You should use the longest possible shutter speed for all firework photographs.
    8·2 answers
  • Your traffic light changes to yellow as you approach an intersection. In most cases, what action should you take?
    15·2 answers
  • __________________ ensures that each row is uniquely identified by the primary key, which means that a proper search for an exis
    10·1 answer
  • Kelvin owns a small trading firm. Recently, he suspected that some of his employees were using fraudulent activities for their p
    5·2 answers
  • What in the world is this for and how do you use it
    8·2 answers
  • What is the FaFASA4caster used for
    10·1 answer
  • Match each term in the second column with its correct definition in the first column. Write the letter of the term on the blank
    12·1 answer
  • Old systems can be useful when designing new computer software.<br> True or False
    7·2 answers
  • Digital Media Equipment: Best Practices Quiz
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!