1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NemiM [27]
2 years ago
6

What are the reasonsfor documenting business rules​

Computers and Technology
1 answer:
kirill115 [55]2 years ago
4 0

Answer:

This is because when there is a mistake, misunderstanding or trouble and one need's evidence, the documented business rule will be available as your evidence.

Explanation:

Sorry if I'm wrong hope it helps

You might be interested in
Apple users tend to like the company and love its products. Apple has successfully nurtured this __________ component of its cus
Nina [5.8K]

Answer:

Apple users tend to like the company and love its products. Apple has successfully nurtured this Affective component of its customers' attitudes.

Explanation:

There are three component of attitudes, they include the behavioral component, the affective component and the cognitive component.  

The affective component of attitude is concerned about the emotional response attached to an attitude.  The affective component  involves a person’s feelings / emotions about the attitude object.  i.e it is basically concerned with the emotional reaction of a person or customer to a particular object or good.  

Hence, apple users liking the company and loving its products shows that Apple has successfully nurtured the affective component of its customers' attitude.  

4 0
3 years ago
There is an interface I that has abstract class AC as its subclass. Class C inherits AC. We know that C delegates to an object o
Aloiza [94]

Answer:

are u in HS or college work

I am trying to understand

6 0
2 years ago
What is one way to maintain Internet safety? a) avoid interacting with people on the Internet. B) avoid giving out information a
Anarel [89]
To be safe on the Internet, we must avoid giving out personal information.
4 0
3 years ago
Let x = ["Red", 2.55,"Green", 3,"Black","false"], then solve the following:
blagie [28]

Answer:

  • Print(x) would be directly calling the x variable so it would print everything but the []
  • Print(x[10]) is calling the number 10 which results in E
  • 2 + d= 2d

3 0
3 years ago
A slow response when opening applications or browsing the Internet, applications that do not work properly, an operating system
blagie [28]

Answer:

C. Symptoms of malware mutation

Explanation:

They are signs that could indicate that ones system is infected by virus.

Such signs includes:

1.Slow booting or startup.

2.Low space storage.

3.Blue screen of death.

4.Slow Internet performance.

5.Sending of spam messages.

6.Disabled security.

7.Browsing error.

8.Pop-up messages.

9.Renaming of files.

10.Loss of certain files, music, messages, etc.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Only the _________ can add users with passwords and limit user access to selected areas.
    5·1 answer
  • You should use _____ software for writing a letter.
    10·1 answer
  • A company gives you a document to review. This document lays out the strengths and weaknesses of a proposed business venture. It
    13·1 answer
  • A digital designer might do computer animation or video games true or false
    13·2 answers
  • Which of the following should you do if your accelerator is stuck? A. Pump your brakes to build fluid pressure. B. Shift to Neut
    14·2 answers
  • Suppose a host has a 1-MB file that is to be sent to another host. The file takes 1 second of CPU time to compress 50%, or 2 sec
    12·1 answer
  • What actions can you take to ensure the physical security of network devices?
    14·2 answers
  • If you need some one to talk to you can talk to me
    13·2 answers
  • Compare the two items in a summary of qualifications taken from a resumé. Which is better?
    9·1 answer
  • Functionality testing is primarily used with ____________. firewall protection software development hardening servers server tes
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!