1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
3 years ago
9

Priscilla is providing the junior analysts, in her firm, on the team with some real-world illustrations to explain some of the r

ecommendations that they must be prepared to make to clients, based on what they have studied in their coursework, in order to solidify their understanding. Which of the following is a reason Priscilla would offer as a reason for in-house software development?​
a. ​The client is looking to spend the least possible time in implementation.
b. ​The client wishes to receive future upgrade from the vendors.
c. ​The client wants to be able to use fewer technical development staff members.
d. The client has a number of very distinctive security requirements.
Computers and Technology
1 answer:
maksim [4K]3 years ago
8 0

Answer:

d.

Explanation:

Based on the information provided within the question it can be said that the best reason in this scenario would be that the client has a number of very distinctive security requirements. A client with very clear and distinct security requirements would best be bypassed and satisfied by making an in-house software development that does not require outside access.

You might be interested in
Which option best explains the goal of computer science?
skad [1K]

Answer:

B correct answer b i think so

8 0
3 years ago
I know that this will be taken down for not being a real question but is anyone else not able to search for anything? I can type
Schach [20]

Answer:

Sameee

Explanation:

6 0
3 years ago
Write the half function. A function call and the functionprototype
EastWind [94]

Answer:

C code for half()

#include<stdio.h>

void half(float *pv);

int main()

{

float value=5.0;  //value is initialized  

printf ("Value before half: %4.1f\n", value); // Prints 5.0

half(&value);  // the function call takes the address of the variable.

printf("Value after half: %4.1f\n", value); // Prints 2.5

}

void half(float *pv) //In function definition pointer pv will hold the address of variable passed.

{

*pv=*pv/2;  //pointer value is accessed through * operator.

}

  • This method is called call-by-reference method.
  • Here when we call a function, we pass the address of the variable instead of passing the value of the variable.
  • The address of “value” is passed from the “half” function within main(), then in called “half” function we store the address in float pointer ‘pv.’ Now inside the half(),  we can manipulate the value pointed by pointer ‘pv’. That will reflect in the main().
  • Inside half() we write *pv=*pv/2, which means the value of variable pointed by ‘pv’ will be the half of its value, so after returning from half function value of variable “value” inside main will be 2.5.

Output:

Output is given as image.

3 0
3 years ago
Consider the following methods.public void modParams(int[] x, int[] y, String[] s){x[1] = 5;y = x;s[1] = new String("five");s =
skad [1K]
I am not too happy to be a good man in my world but he is made me very very much and he is made me very very much and he is very much very good to him very much and he is very much very good to you very good and very much to be able for my kids with a little more money will not go back and you can do the greatest if he can be very much and you have no problem and then we do all the way that we are not the right answer but you have a question to do and you don’t have the right right answer the answer right back and he will not be very good I am very good and he is very very bad
5 0
3 years ago
How do I add my bestie on brainy? /??!!! ​
ziro4ka [17]

Answer:

You have to remember their name on here

Explanation:

If u dont you cant talk to them again

3 0
3 years ago
Other questions:
  • There are n tasks to complete. Each task first needs to be preprocessed on a supercomputer and then finished on one of n process
    12·1 answer
  • Question 2 (1 point)
    9·1 answer
  • Write the function mystrchr(). the function has two parameters: a const char * s pointing to the first character in a c-style st
    14·1 answer
  • How can i become an ailen?
    5·2 answers
  • Program 4: But I haven’t taken Calculus yet! OK – we admit, this one might look nasty, but read on because it’s not that bad. On
    11·1 answer
  • "Because Standard Error and Standard Ouput represent the results of a command and Standard Input represents the input required f
    6·1 answer
  • Visual-verbal synergy has nothing to do with text, but solely with images used in a design.
    9·1 answer
  • George works for a print newspaper in which of these areas would you be interested to hire new recruits for the newspaper WHICH
    11·1 answer
  • Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goa
    10·2 answers
  • A computer is the __________ of an attack when it is used to conduct an attack against another computer.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!