1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
borishaifa [10]
3 years ago
10

Design by contract considers the software system to be a setof:

Computers and Technology
1 answer:
Ludmilka [50]3 years ago
5 0

Answer: A) clients and servers

Explanation:

 Design by contract considers the software system to be a set of Clients and server as, the contract designing is the contract software programming approached for making the effective system software. This type of approach are consider that all the components of the clients that are instance of an operation on the components of the server, which can fulfill the precondition specific requirements which including in that operations.

You might be interested in
What will the computer do in response to a line of code reading # name = input("What is your name?")
lorasvet [3.4K]

Answer:

it would show What is your name? on the screen and you would be able to input your name

Explanation:

4 0
3 years ago
How many spaces is equal to one tab on a keyboard? When I compose emails, the tab button doesn't indent for me, so how many time
Ganezh [65]
You have to press the space bar 13 times in order to make it the same length as the tab.
6 0
4 years ago
Which invention allowed computers to become smaller in size?
dexar [7]
computers got smaller because one of its main components the valve – was replaced by the much smaller transistor.
7 0
3 years ago
What is the correct keyboard shortcut to cut a cell value
vladimir2022 [97]

Answer:

Cntrl+X

Explanation:

Do it on your computer

4 0
3 years ago
What is an XML-based open standard for exchanging authentication and authorization information and is commonly used for web appl
nalin [4]

Answer:

SAML.

Explanation:

SAML seems to be an accessible standardized XML-based for some of the sharing of validation and verification details and has been generally implemented for the web apps and it seems to be a design that would be SSO. Verification data is shared via XML documentation which are securely signed. So, the following answer is correct according to the given scenario.

4 0
3 years ago
Other questions:
  • Which is most likely to cause confusion, hinder thinking, and prevent quick access to resources in a study environment? phones c
    5·2 answers
  • Explain the nature of documents that can be suitable for mergin
    12·1 answer
  • What type of multimedia is a game CD? Game CDs are examples of ___ multimedia.
    15·2 answers
  • By default, the hyperlink will display the text in the hyperlink itself, such as the web URL. How can this behavior be modified?
    12·1 answer
  • Stuart wants to delete some text from a slide. What should Stuart do?
    8·1 answer
  • 2.Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
    10·1 answer
  • Write fade in shorthand​
    11·1 answer
  • Help fast pleas. 3. How is this text formatted? (1 point)
    14·1 answer
  • What are different sheet icons
    5·1 answer
  • Consider a system which has a memory access time of 300 nsec. An average page fault takes around 10 millisecond to get serviced.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!