1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
4 years ago
9

Priscilla is providing the junior analysts, in her firm, on the team with some real-world illustrations to explain some of the r

ecommendations that they must be prepared to make to clients, based on what they have studied in their coursework, in order to solidify their understanding. Which of the following is a reason Priscilla would offer as a reason for in-house software development?​
a. ​The client is looking to spend the least possible time in implementation.
b. ​The client wishes to receive future upgrade from the vendors.
c. ​The client wants to be able to use fewer technical development staff members.
d. The client has a number of very distinctive security requirements.
Computers and Technology
1 answer:
maksim [4K]4 years ago
8 0

Answer:

d.

Explanation:

Based on the information provided within the question it can be said that the best reason in this scenario would be that the client has a number of very distinctive security requirements. A client with very clear and distinct security requirements would best be bypassed and satisfied by making an in-house software development that does not require outside access.

You might be interested in
Cursor/Blinking line is used to show current_ on document. A- Color b- Status c- Type d- Location
Natalija [7]

Answer:

d. Location

Pretty sure this is it.

7 0
3 years ago
1. Define lexemes. Give an example of an lexeme in any programming language.<br>​
tresset_1 [31]

The correct answer is; " a unit of lexical meaning that underlies a set of words that are related through inflection."

Further Explanation:

The lexeme is part of the stream where the tokens are taken and identified from. When these streams become broken, there is always an error message. The lexeme is known as "the building blocks of language."

These are a very important part of computer programming. If any string or character is misplaced this can stop the entire program or operation.

One example of a lexeme is;

  • the symbols (, ), and -> are for the letter C.

Learn more about computer programming at brainly.com/question/13111093

#LearnwithBrainly

4 0
4 years ago
g What field in the IPv4 datagram header can be used to ensure that a packet is forwarded through no more than N routers? When a
ad-work [718]

Answer:

a) Time to live field

b) Destination

c) Yes, they have two ip addresses.

d) 128 bits

e) 32 hexadecimal digits

Explanation:

a) the time to live field (TTL) indicates how long a packet can survive in a network and whether the packet should be discarded. The TTL is filled to limit the number of packets passing through N routers.

b) When a large datagram is fragmented into multiple smaller datagrams, they are reassembled at the destination into a single large datagram before beung passed to the next layer.

c) Yes, each router has a unique IP address that can be used to identify it. Each router has two IP addresses, each assigned to the wide area network interface and the local area network interface.

d) IPv6 addresses are represented by eight our characters hexadecimal numbers. Each hexadecimal number have 16 bits making a total of 128 bits (8 × 16)  

e) IPv6 address has 32 hexadecimal digits with 4 bits/hex digit

4 0
3 years ago
A malware-infected networked host under the remote control of a hacker is commonly referred to as:
natali 33 [55]

Answer:

Option a: Trojan

Explanation:

A Trojan or Trojan horse is one of the computer malware that exist in computing world. Trojan often appears as a legitimate software to deceive user to activate it by social engineering. Once the Trojan is activated in the user computer, a hacker can remote control the infected computer for malicious purposes such as removing files, sending files, displaying message or rebooting computer.

However, Trojan cannot be replicated in the infected computer.

7 0
4 years ago
Read 2 more answers
Why wont my account update from Expert to Ace? I have all the points and branliests to be Ace but it wont update
grin007 [14]

Answer:

Maybe you don't have all the points and brainliests needed. Double check and if you actually don't, try to reload your device. If it still isn't working, there is something wrong with your device.

Explanation:

PLEASE MARK ME AS BRAINLIEST I REALLY WANT TO LEVEL UP

8 0
2 years ago
Read 2 more answers
Other questions:
  • After calling the customer service line of Delta airlines, Francis received an email asking her to fill out customer satisfactio
    9·1 answer
  • Show the subnet address, subnet mask in slash notation, broadcast address, number of addresses, first valid host address, and th
    13·1 answer
  • Which method of accessing FTP has the most limited capabilities?
    9·2 answers
  • Find products that satisfy BOTH conditions below:______
    6·1 answer
  • FIGURE A-1—Use the information in this chart to answer Question 1.
    6·1 answer
  • Does anyone know why I get notifications on Brainly that say they are from 4 hours ago even though they were just answered
    9·1 answer
  • What does it mean if my ninja blender power light is blinking?
    13·2 answers
  • Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order). The memory allocation algorithm th
    14·1 answer
  • A good information that contains the facts necessary for decision makers to solve a problem is characterized by the __________.
    15·2 answers
  • What is the basic body structure of html.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!