1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dexar [7]
3 years ago
12

refers to a problem-solving approach that requires defining the scope of a system, dividing it into its components, and then ide

ntifying and evaluating its problems, opportunities, constraints, and needs. a. Linear programming b. Independent component analysis c. Principal component analysis d. Systems analysis
Computers and Technology
1 answer:
lilavasa [31]3 years ago
6 0

Answer:

D. System Analysis

Explanation:

System analysis can be defined as the process of analysing a problem in order to the know the cause thereby finding a way to resolve it or finding a solution to it.

System analysis enables us to easily study procedure or process thereby identifying what the objective of the procedures is which will in turn help to achieve what we needed to achieve.

System analysis is important because it enables easier identification of a problem which make us to find the best way to solve the problem since it is a problem solving technique which ensures that all problem are been resolved accurately and efficiently

You might be interested in
Can someone please do this java lab for me (100 point version)?
nalin [4]

Answer:

.........................................sorry, dude I download the doc but ,I can't open it.

5 0
3 years ago
Plagiarism occurs when writers
pentagon [3]

Answer:

<h3><em>A</em>- Use others' ideas and writing as their own</h3>

Explaniation:

it's plagiarism, just don't take other people's work and pass it as your own. smh lol

3 0
4 years ago
Read 2 more answers
What font family is Times New Roman an what font family is Arial?
Alexxandr [17]

Answer:

Some Font Examples

Generic Font Family                 Examples of Font Names

Serif                    Times New Roman Georgia Garamond

Sans-serif                          Arial Verdana Helvetica

Monospace                     Courier New Lucida Console Monaco

Cursive                        Brush Script MT Lucida Handwriting

Explanation:

hope it help

4 0
3 years ago
Read 2 more answers
NEED HELP
amid [387]

Answer:

i would do B

Explanation:

I YOUNGI

I MIDDLE I

I   AGED  I

I     MEH   I

I_______ I

\ kinda old/

  \ ____ /

   I OLD I

3 0
3 years ago
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a s
Allisa [31]

Answer:

distributed denial of service

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • When you insert an object in a document, Word always inserts it as a floating object. true or false
    14·1 answer
  • In a database list, fields are displayed as _____. rows columns tables records
    10·1 answer
  • Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would
    6·1 answer
  • Compute the approximate acceleration of gravity for an object above the earth's surface, assigning accel_gravity with the result
    14·1 answer
  • Spoderman memes<br> im scared-
    15·2 answers
  • True or False: the sky looks blue because it is reflecting the blue ocean.​
    12·2 answers
  • PLS HELP ASAP) Omar is using the web to do research on diabetes. he needs to ensure that all of the information he finds regardi
    7·1 answer
  • PT8 what does the word " fossil " mean
    11·2 answers
  • what is the reason for assigning the management of file sharing, security, and quotas to administrators . why would it be pruden
    12·1 answer
  • What physical disk oriented performance counter should be used to determine the number of requests waiting to be processed by a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!