1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Butoxors [25]
3 years ago
15

Explain why the fundamental software engineering principles of process, dependability, requirements management, and reuse are re

levant to all types of software system.
Computers and Technology
1 answer:
Georgia [21]3 years ago
8 0

These principles are not explicit to one kind of program and are increasingly broad "best practice" rules that assist designers with composing code that is easier to maintain.

<u>Explanation:</u>

A set of programming guidelines that are executed to play out a particular undertaking according to the prerequisites of the client is known as programming. Every product has some essential standards to follow. In light of all product frameworks have basic quality traits, including accessibility, modifiability, execution, security and wellbeing, testability and ease of use, the key programming thoughts give basic arrangements or strategies to help those characteristics.

It is generally less expensive, over the long haul, to utilize programming designing strategies and methods for programming frameworks instead of simply compose the projects as though it was an individual programming venture.

You might be interested in
Prompt the user to enter a string of their choosing. Output the string. (1 pt) Ex: Enter a sentence or phrase: The only thing we
frosja888 [35]

Answer:

Explanation:

Section 1) Enter String and Output String

#include<iostream> //for input and output  

#include <string>  // for string  

using namespace std;  

int main()  

{  

   string sentense;

   cout<<"Enter a sentence or phrase: ";

  getline(cin,sentense);

  cout<<"You Entered :"<<sentense;

   return 0;  

}

Output

Enter a sentence or phrase: The only thing we have to fear is fear itself

You Entered :The only thing we have to fear is fear itself

Explanation

To get full sentence or phrase, we need to call getline function in string package which will get the overall entered string. cin will not get the whole sentence

Section 2) GetNumOfCharacters

int getNumberOfCharacters(string sentence){

int count =0;

for(int i=0; i<sentence.size(); i++){

 count++;

}

return count;

}

Explanation

As we have taken sentence as string in previous section, we need to count total number of characters in the input string. for that purpose we are iterating over all the characters within string through for loop. declaring count variable and initializing it with 0 and increment on every for loop iteration. at the end returning the count variable.

Section 3) Call the GetNumOfCharacters() in main method.

int main()  

{  

   string sentence;

   cout<<"Enter a sentence or phrase: ";

  getline(cin,sentence);

  cout<< getNumberOfCharacters(sentence);  //Here we call out method and output its value

   return 0;  

}

Explanation

In main method first we get the sentence with getline and then by using cout and calling the getNumberOfCharacters(sentence) function it will show the number of characters in string.

Output

Enter a sentence or phrase: The only thing we have to fear is fear itself

45

Section 4) Implement OutputWithoutWhitespace() function

#include<iostream> //for input and output  

#include <string>  // for string  

using namespace std;  

int getNumberOfCharacters(string sentence){

int count =0;

for(int i=0; i<sentence.size(); i++){

 count++;

}

return count;

}

void OutputWithoutWhitespace(string sentence){

string output="";

 for(int i=0; i<sentence.size(); i++){

 if(sentence[i]!=' ' && sentence[i] != '\t'){  // checking the tab and spaces

  output+=sentence[i];  //then add that into output string

 }

}

cout<< output;

}

int main()  

{  

   string sentence;

   cout<<"Enter a sentence or phrase: ";

  getline(cin,sentence);

  OutputWithoutWhitespace(sentence);

   return 0;  

}  

Code Explanation

In OutputWithoutWhitespace() function we get string as a parameter and iterating all the characters and if current iteration character from sentence string is not equal to tab('\t') and space then add that character into output string. After the loop is finished, output the result.

Output

Enter a sentence or phrase: The only thing we have to fear is fear itself       hello

Theonlythingwehavetofearisfearitselfhello

7 0
3 years ago
Imagine that you are investigating a crime of fraud, where the suspect is creating false documents. Where might you look for evi
kolbaska11 [484]
You would look in the documents folder on the persons computer. You could also look for photo file types if the perp was using photoshop to make changes to documents and then printing them. 
4 0
3 years ago
Read 2 more answers
The _______ of the story describes the events that takes place as well as the conflict or problem that must be resolved.
Crank

Answer:

The answer is C the plot.

7 0
3 years ago
Which company introduce the first Minicomputer in 1960.​
madreJ [45]

Answer:

<em>t</em><em>h</em><em>e</em><em> </em><em>f</em><em>i</em><em>r</em><em>s</em><em>t</em><em> </em><em>m</em><em>i</em><em>n</em><em>i</em><em>c</em><em>o</em><em>m</em><em>p</em><em>u</em><em>t</em><em>e</em><em>r</em><em> </em><em>w</em><em>a</em><em>s</em><em> </em><em>i</em><em>n</em><em>t</em><em>r</em><em>o</em><em>d</em><em>u</em><em>c</em><em>e</em><em> </em><em>b</em><em>y</em><em> </em><em>d</em><em>i</em><em>g</em><em>i</em><em>t</em><em>a</em><em>l</em><em> </em><em>e</em><em>q</em><em>u</em><em>i</em><em>p</em><em>m</em><em>e</em><em>n</em><em>t</em><em> </em><em>c</em><em>o</em><em>r</em><em>o</em><em>p</em><em>o</em><em>r</em><em>a</em><em>t</em><em>i</em><em>o</em><em>n</em><em> </em><em>(</em><em>D</em><em>E</em><em>C</em><em>)</em><em>a</em><em>f</em><em>t</em><em>e</em><em>r</em><em> </em><em>t</em><em>h</em><em>e</em><em>s</em><em>e</em><em> </em><em>I</em><em>B</em><em>M</em><em> </em><em>c</em><em>o</em><em>r</em><em>p</em><em>o</em><em>r</em><em>a</em><em>t</em><em>i</em><em>o</em><em>n</em><em> </em><em>a</em><em>l</em><em>s</em><em>o</em><em> </em><em>m</em><em>i</em><em>n</em><em>i</em><em>c</em><em>o</em><em>m</em><em>p</em><em>u</em><em>t</em><em>e</em><em>r</em><em> </em><em>f</em><em>o</em><em>r</em><em> </em><em>e</em><em>x</em><em>a</em><em>m</em><em>p</em><em>l</em><em>e</em><em> </em><em>P</em><em>D</em><em>P</em><em>–</em><em>1</em><em>1</em>

7 0
3 years ago
Read 2 more answers
A technician is working at a client's office after hours and needs two cables to finish the work but does not have immediate acc
svetlana [45]

Answer:

The following are the answers of the given scenario.

  • Crimper
  • Cable tester
  • Cable stri.pper

Explanation:

After hours, the specialist operates at that same customer's workplace as well as wants several wires to complete the job, although it would not provide direct links for pre-built wires. The wire required seems to be a dial-up link from the dial-up network to an original analog POTS port on a wall. Another wire would be to attach an Ethernet from the device to that of the current keystone port on that same wall.

Thus, Crimper, Cable Tester and Cable Stri.pper are the same equipment that the specialist needs to use to create the wires as well as then check whether these all operate correctly.

3 0
3 years ago
Other questions:
  • Which of the following is a valid call for the generic method declared below? and why?
    9·2 answers
  • A stack is initially empty, then the following commands are performed: push 5, push 7, pop, push 10, push 5, pop, which of the f
    8·1 answer
  • Lux Ladies, Inc., is a company that specializes in expensive and unusual gifts for all occasions. It keeps a large file of infor
    11·1 answer
  • Most computer attacks are designed to steal information or money. Which of the following attacks is designed to slow down or sto
    14·1 answer
  • Ideally an entity identifier is composed of _____ attribute(s).
    11·1 answer
  • The following checksum formula is widely used by banks and credit card companies to validate legal account numbers: d0 + f(d1) +
    13·1 answer
  • Some machine/items/gadget having only hardware​
    8·1 answer
  • What is the output of the following code?<br> print (12 // 6)
    12·1 answer
  • You're doing desktop support and the company policy is that you can only help with company equipment. A user walks in:
    6·1 answer
  • 1. Read What You Need to Know closely and watch the Five Components of Fitness video
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!