1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vampirchik [111]
3 years ago
8

Who is a software engineer

Computers and Technology
2 answers:
kolbaska11 [484]3 years ago
6 0

Answer:

it is correct answer

please follow me

if you understand it

AnnyKZ [126]3 years ago
5 0
A person who applies principles of software engineering to the design
Hope this helps !
You might be interested in
What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
serg [7]

Answer:

Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.

4 0
3 years ago
What are potential problems with using nanorobots ?
mash [69]
It can penetrate the blood-brain barrier.
5 0
3 years ago
This is an example of ______________ of variables:
Sedbober [7]

Answer:

Encapsulation is an example of variables

6 0
3 years ago
Look at the options below. Which one is a simulation?
Elena-2011 [213]

Im going to guess the 2nd one.

The 1st one just shows how trees can make ____ and then goes to water, the sun, then the rain but it CAN be used as one.

The 2nd one seems to explain the best it can show about weather, water, landforms, the sun, and seems like a better one to choose.

5 0
3 years ago
Why is it important to write something in the subject line of emails?
marin [14]
So the person can know what you want and it helps keep better track of emails and subject matters
8 0
3 years ago
Read 2 more answers
Other questions:
  • trhy356<br>yjetyi46ui y j4yhnpug 2utg[ 2[ 24[ou [o24t
    15·1 answer
  • Under what key category do page up and page down keys fall?
    15·1 answer
  • A motherboard uses dual channeling, but you have four DIMMs available that differ in size. The motherboard supports all four siz
    7·1 answer
  • Which form of investigation aims at checking whether or not a target system is subject to attack based on a database of tests, s
    15·1 answer
  • (1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term e
    10·1 answer
  • Case Study/Scenario: First, Julio clicks Tools from the Chrome menu on the toolbar. Next, he looks for Manage Add-Ons but can no
    9·1 answer
  • Hello everyone. New ppl on Ro.blox? I want to play sometime.
    8·2 answers
  • Write the name of main ore of silver.Write any two application of sliver​
    14·1 answer
  • How does the quantity of data affect the accuracy of an experiment?
    7·1 answer
  • Develop a program to sort a file consisting of bonks details in the alphabetical order of author names. The details of books inc
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!