1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mina [271]
3 years ago
11

Jim has documented a use case that describes the functionality of a system as "To compute gross pay, multiply the hours worked t

hat are recorded on the time card from the time clock by the hourly rate that is recorded in the employee master file from the MS SQL server database." This is an example of a(n) _____ use case.a. overview.b. detail.c. essential.d. real.e. imaginary.
Computers and Technology
1 answer:
melisa1 [442]3 years ago
4 0

Answer:

real

Explanation:

According to my research on different categories of use cases, I can say that based on the information provided within the question this is an example of a real use case. A "real" use case is defined as a use case in which the individual details the steps or functionality as well as various details showing the commitment from the technology and design to the system. Which is what Jim is detailing as he describes what the functionality of the system is and that where everything is sent (MS SQL server database).

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
Write a method that determines the total number of chars in each string of an array.
Serjik [45]
The total number of chars in each string is basically the size of each string.

Using JAVA:

        String[] arr = {"hello", "my", "name", "is", "Felicia"};                int count = 0;        for(int i = 0; i < arr.length; i++) {            count = count + arr[i].length();            System.out.println("Characters in " + arr[i] + ": " + count);        }

Output: 
<span>Characters in hello: 5
Characters in my: 7
Characters in name: 11
Characters in is: 13
Characters in Felicia: 20</span>


8 0
3 years ago
How was kapilvastu named​
mixas84 [53]

Answer:  Kapilvastu was named after Vedic sage Kapilamuni

4 0
3 years ago
The ________ method displays a message to the user and contains one button.
jolli1 [7]
<span>The <em><u>message box</u></em> method displays a message to the user and contains one button.</span>
6 0
3 years ago
What is heaven backwards?
sweet-ann [11.9K]
It is Nevaeh backwards hope that helps! :3 and feel free to pm me if you have anymore questions! :3
5 0
2 years ago
Read 2 more answers
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY &lt;3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
2 years ago
Other questions:
  • Describe the Sign in process of an Email account.​
    6·1 answer
  • What is the difference between a learner’s license and an operator’s license?
    5·1 answer
  • The position of a _____ is a nontechnical position responsible for defining and implementing consistent principles for setting d
    15·1 answer
  • Anybody know this question???
    6·1 answer
  • "The ability to assign system policies, deploy software, and assign permissions and rights to users of network resources in a ce
    7·1 answer
  • SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long bee
    7·1 answer
  • Question 2 of 3
    7·2 answers
  • What are other ways you could use the shake or compass code blocks in physical computing projects?
    14·1 answer
  • Please answer it’s timed
    11·1 answer
  • What role do play in medicine ​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!