1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gizmo_the_mogwai [7]
3 years ago
7

Week 3 Discussion Requirements Modeling Requirements modeling is one of the earlier phases of software development where require

ments are captured and analyzed. One area that is oſten overlooked is properly capturing non-functional requirements. After engaging in research discuss one non-functional requirement that is common among IT projects. Be sure to include in your answer why it's important, and what the issues might be if it is overlooked Avoic discussing non-functional requirements presented by classmates.​
Computers and Technology
2 answers:
steposvetlana [31]3 years ago
8 0
Soooooooooooooooooooooooooooo
iragen [17]3 years ago
3 0

i dont understand wha your asking

You might be interested in
1.An algorithm used to find a value in an array is called a ______________.
Amanda [17]

Answer:

b

Explanation:

7 0
3 years ago
Read 2 more answers
Which of these is a valid use of the Reply All feature?
zalisa [80]

Answer:

I think is None of this ,

6 0
3 years ago
Which example best demonstrates an impact of computers on the economy?
Lana71 [14]

Answer:

a

Explanation:

7 0
3 years ago
What do newly PivotTables look like?
adell [148]

Answer:

Answer is in attached image!

Explanation:

8 0
3 years ago
There are local administrators for each of the departments, excluding the IT. These local administrators will use the local admi
torisob [31]

Answer:

Listed below are the few ways Linux Server can be secured

1. Group policies: This is a way to ensure security by applying group policies and permissions both on the group level and the files level. Through proper permission configuration we can easily restrict other users from accessing those files and directories.

2. Implementation of the firewall: Implementing firewall in each of the Linux server will definitely help in securing your machine from outside threats. Iptables will help in filtering the network traffic that are entering into the system and even going out of the system.

3.Enabling SELINUX: Enabling SELINUX is another way to secure your system especially a Linux Server. Selinux is a powerful security that checks and allows applications to run into the system. It won't allow any untrusted application to run into the system.

6 0
3 years ago
Other questions:
  • Which statements describe the advantages of using XML?
    12·2 answers
  • What are words with the root gest?
    15·1 answer
  • .When an argument is passed ______________, the called method can access and modify the caller’s original data directly.
    8·1 answer
  • What is the order of arrangement of files and folders on a computer?
    15·1 answer
  • Which registry hive is loaded first during windows startup?
    5·1 answer
  • A provides legal protection for something an individual has created
    12·1 answer
  • Do you remember your first 3D movie experience? What was the movie, what was the experience like, and why was it memorable? (If
    7·1 answer
  • A user complains that the pointer movement on his laptop computer is very erratic what should you do?
    9·1 answer
  • How do I fix when it hits the second session it skips scanf.
    6·1 answer
  • Explain in detail, how the Depth Wavelet Transform (DWT) algorithm works, specifically with respect to EEGs (a non-invasive brai
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!