1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NemiM [27]
2 years ago
6

What are the reasonsfor documenting business rules​

Computers and Technology
1 answer:
kirill115 [55]2 years ago
4 0

Answer:

This is because when there is a mistake, misunderstanding or trouble and one need's evidence, the documented business rule will be available as your evidence.

Explanation:

Sorry if I'm wrong hope it helps

You might be interested in
A Java main method uses the parameter (String[ ] variable) so that a user can run the program and supply "command-line" paramete
Firdavs [7]

Answer:

The answer is "Option a"

Explanation:

  • In java, the main function is the point of entry of every java program. Its syntax always starts "public static void main" with (String args[]), in which it can also be modified by the name of the string array name.
  • It also known as an entry point is the key process. In any program, it is the first method, that executes whenever you run a program. There is one main feature in a regular app that uses instances of certain classes to operate.
4 0
3 years ago
In a system with paging as the address translation mechanism, using multi-level paging always causes less memory usage for stori
Zarrin [17]

Answer:

The given statement is "True". A further explanation is given below.

Explanation:

  • Multi level paging can conserve storage capacity as opposed to sequential paging, including some of its hierarchical method Multi-level paging completing such.
  • Rather precisely, with either the aid of the number of co-association, clients will determine which unique category of 2²⁰ pages whose data are stored as well as the pick itself.
3 0
3 years ago
What is a number system, and what is the total number of digits used in this system called?
DENIUS [597]
The number system is what is use globally as are way of counting the total number of digits is 9 because you can make any number with characters 1-9
7 0
3 years ago
Time-management techniques work most effectively when performed in which order?
Sholpan [36]

Answer:

study-time survey, project schedule, prioritize tasks, reward system.

Explanation:

Time management can be defined as a strategic process which typically involves organizing, planning and controlling the time spent on an activity, so as to effectively and efficiently enhance productivity. Thus, when time is properly managed, it avails us the opportunity to work smartly rather than tediously (hardly) and as such making it possible to achieve quite a lot within a short timeframe. Also, a good time management helps us to deal with work-related pressures and tight schedules through the process of properly allocating the right time to the right activity.

Hence, time-management techniques work most effectively when performed in the following sequential order; study-time survey, project schedule, prioritize tasks, and designing (creating) a reward system.

4 0
3 years ago
A(n) ________________ is a software tool for specifying the content and format for a database report.
Alex_Xolod [135]
A report generator is a software tool for specifying the content and format for a database report. It is a program where it takes data from a database and use it in producing a file that can be understood by humans. These databases include XML stream, OpenCover, PartCover and the like.
7 0
3 years ago
Other questions:
  • If you want to track users and sessions across multiple domains, what must you set up?
    11·1 answer
  • Which of the following is a narrative essay most like?
    10·2 answers
  • Assuming that the actual process ids of the parent and child process are 2600 and 2650 respectively, what will be printed out at
    10·1 answer
  • Name similarities between innovation and invention
    6·1 answer
  • Provide a few examples of how cryptography actually secures data.
    8·1 answer
  • Why should we be careful about opening email attachments?
    8·2 answers
  • What are the process of boots up a computer?​
    15·2 answers
  • List five application programs you recommend, and write a sentence explaining why.
    9·1 answer
  • Can someone help me plz
    13·2 answers
  • What are the nuclear codes?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!