1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grigory [225]
3 years ago
9

Productivity, rework, and technology impact are examples of which kind of software metric?

Computers and Technology
1 answer:
fgiga [73]3 years ago
6 0

The correct answer should be process type of software metric. The process metrics are used to help in strategic decision making. The processes such as work products delivery, expended human hours and conformance to quality and schedule are all metrics in the process domain.

You might be interested in
In the following cell, we've loaded the text of Pride and Prejudice by Jane Austen, split it into individual words, and stored t
Sever21 [200]

Answer:

Explanation:

Since the array is not provided, I created a Python function that takes in the array and loops through it counting all of the words that are longer than 5. Then it returns the variable longer_than_five. To test this function I created an array of words based on the synapse of Pride and Prejudice. The output can be seen in the attached picture below.

def countWords(p_and_p_words):

   longer_than_five = 0

   for word in p_and_p_words:

       if len(word) > 5:

           longer_than_five += 1

   return longer_than_five

7 0
3 years ago
What’s unique about New Cashierless stores?
Anettt [7]
There’s no cashiers, meaning if you need help you got to figure it out alone.
7 0
3 years ago
You work as a Network Administrator for wwwpany Inc. You have suspected a bad driver or perhaps malware. Which of the following
vichka [17]

Answer:

Explanation:

There is a solution called ETA (Encrypted Traffic Analytics) this is a security advanced network that helps us to identify malware between the encrypted data, but with this tool is no necessary to break any protection and privacy chain.

This technology use machine learning to read all the traffic without deciphering it, in this way we can detect a difference between reliable and malicious traffic.

En windows we can use Microsoft Security Essentials like antivirus and detect virus, we can use Process Explorer, analyze the traffic, we can use Microsoft Network Monitor.

8 0
3 years ago
Which of the following statements is true? a. Predicate methods typically test a condition and modify the object on which they'r
egoroff_w [7]

Answer:

C

Explanation:

Predicate methods typically test a condition and do not modify the object on which they're called.

3 0
3 years ago
For each scenario, select the best solution to try from the drop-down menu. A computer will not connect to the network. An IP ad
Inessa05 [86]

Answer:

1) Check the switches, routers, and hubs.

2) Try logging off and on again.

3) Make sure everything is plugged in and turned on.

4) Restore files from backup versions.

Explanation:

Hope this helped!! :D

6 0
3 years ago
Other questions:
  • How much a 1 Gigabyte in Bytes:<br> 1. 1e+9<br> 2. 1e+6<br> 3. 1000
    8·2 answers
  • Least common multiple of 78,90, and 140
    10·2 answers
  • An example of a(n) ____ reconnaissance attack is a user who sends SQL injections to a system in hopes of generating some type of
    7·2 answers
  • If I'm screen sharing and I plug in a HDMI, will it screen share what the HDMI is plugged into, and can you talk at the same tim
    11·1 answer
  • Which of the following is not an example of plagiarism?
    10·1 answer
  • Betty set up an account on a popular social networking website. she wants to know whether the privacy policy is effective for he
    14·1 answer
  • Which of the following is the best example of an installation issue?
    6·2 answers
  • Give your own example of a nested conditional that can be modified to become a single conditional, and show the equivalent singl
    12·1 answer
  • Jackie is planning a surprise birthday party for her best friend and is researching a location to have the party. Jackie found a
    6·1 answer
  • List 1 reason people invest in Cryptocurrency
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!