1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
joja [24]
4 years ago
10

Describe practices that enable software designers to think about using patterns?

Computers and Technology
1 answer:
prisoha [69]4 years ago
5 0

Answer:

 Firstly, the software designer basically understand the pattern of the system by think with broader perspective. By establish the pattern first design the proper context of the system.

The pattern dependency basically focus on manage the relationship between the different types of the modules. It basically provide the actual guidance which increase the reuse-ability of the module.  

We can also extract the given pattern that from the level of the abstraction and lack cohesion modules are basically difficult to maintain.

You might be interested in
What are the programs required to work in computer
BARSIC [14]

Answer:

Specific requirements vary by employer, but completing a degree program or a coding academy is generally necessary to begin a career as a computer programmer.

Explanation:

please mark me as brainliest

8 0
3 years ago
Los antivirus no son infalibles y en ocasiones pueden darnos:
Damm [24]

la respuesta es:

Falsos Positivos

6 0
3 years ago
. What are the typical parts of a Change Request Document?
photoshop1234 [79]

Answer:

 Change request is the type of document which basically contain the adjustment of the system by call and the change request is the essential and important part in the process of change management.

Change request must be declarative as, it state that what should be accomplish, but forget about the change that should be completed. The main elements or parts of the change request are:

  • Customer ID
  • Abstract change
  • The deadline change type

The importance of the change request document is that it is used in various type of SDLC and project management system. It is basically originate from the system request from the users.

3 0
3 years ago
Write the definition of a function named rcopy that reads all the strings remaining to be read in standard input and displays th
pickupchik [31]

Answer:

//Include this header file if program is executing on //visual studio.

#include "stdafx.h";

//Include the required header file.

#include <iostream>

#include <string>

//Use the standard namespace.

using namespace std;

//Define the function rcopy.

void rcopy()

{

    //Declare a string variable to store the string.

    string s;

    //Prompt the user to input the string.

    cin >> s;

    //Check if the string entered by the user reach to

    //the next line character.

    if (cin.get() == '\n')

    {

         //Display the last word in the string.

         cout << s << " ";

         //Return from the if statement.

         return;

    }

    //Make a recursive call to the function rcopy.

    rcopy();

    //Display the remaining words in the string in

    //the reverse order.

    cout << s << " ";

}

//Start the execution of the main method.

int main()

{

    //Call the function rcopy.

    rcopy();

    //Use this system command to hold the console screen      //in visual studio.

    system("pause");

    //Return an integer value to the main function.

    return 0;

}

Explanation:

See attached images for the code and output

5 0
3 years ago
What are some examples and non-examples of digital security?
deff fn [24]

Answer:

Devices such as a smart card-based USB token, the SIM card in your cell phone, the secure chip in your contactless payment card or an ePassport are digital security devices

5 0
3 years ago
Other questions:
  • Describe the difference between gui and cli​
    9·1 answer
  • Which cloud computing service model gives software developers access to multiple operating systems for testing?
    5·1 answer
  • In networking, what addressing type is used in sending an email to someone?
    6·1 answer
  • The figure below shows a black and white image with a resolution of 720×504. Identify how much memory (in bits) will be occupied
    15·1 answer
  • Corell Inc. has an online tool that offers a wide variety of Corell shoes for direct purchase. The tool even allows customers to
    9·1 answer
  • How are computers used in producing weather forecasts?
    8·1 answer
  • Write a script that will calculate a person’s weight on each planet of the solar system, the sun, and the moon. You should creat
    11·1 answer
  • Easy coding question, please help.
    13·1 answer
  • Please tell fast plzzzzzzzz​
    11·2 answers
  • create your own min function that finds the minimum element in a list and use it in a separate function
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!