1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PolarNik [594]
3 years ago
15

Which of the following are common problems experienced with software applications?

Computers and Technology
1 answer:
dimulka [17.4K]3 years ago
6 0
1. Incorrect Calculations 2. Incorrect data edits 3. Ineffective data edits 4. Incorrect coding/implementation of business rules 5. Inadequate software performance 6. Confusing or misleading data 7. Software that is difficult to use 8. Obsolete software 9. Inconsistent processing 10. Difficult to maintain and understand 11. Inadequate security controls
You might be interested in
For any two documents x and z, define k(x, z) to equal the number of unique words that occur in both x and z (i.e., the size of
mars1129 [50]

Answer:

Yes, the function k(x,z) is a kernel

Explanation:

To show that k(x,z) is a kernel.

First, we'll need to explicitly construct two features of k(x,z).

The features are:

vector φ(x) and vector φ(z) in such a way that K(x,z) =φ(x)·φ(z).

Then, we proceed to the next step...

For any given documents, a vocabulary V can be constructed.

Vocabulary V is finite size for the words in the document set.

Given V, a feature mapping φ(x) can then be constructed for x by the following:

For the kth word wk in V, if wk appears in document x, assign φ(x) k(the kth element of φ(x)) to be 1; else assign 0 to it.

Then the number of unique words common in x and z is φ(x)·φ(z).

This gives us the kernel.

8 0
4 years ago
Name two driving factors in the development of computers.
sertanlavr [38]

The two driving factors in the development of computers are the  Skill set of the team. [If the team is well versed in a specific stack, then the performance will be good as compared to any other stack].

<h3>What re the matters?</h3>

There are some matters to consider. For business programs, I'd say gaming. A lot of what the common laptop makes use of for enterprise doesn't require that kind of electricity.

  1. The skill set of the team. [If the team is well versed in a specific stack, then the performance will be good as compared to any other stack]
  2. Process familiarity. [If dev team knows the stack but the deployment/service team is new, then you may run into deployment and maintenance issues.]

Read more about the computers:

brainly.com/question/24540334

#SPJ1

8 0
2 years ago
The analysts at Techno Info Systems are considering the four-model approach to system development for a new client. If they make
Natali [406]

Answer:

Option B is correct.

Explanation:

Within Techno Info Systems the user has been analyst contemplating that four-model concept towards computer development for such its new customer. When they adopt that four-model method, thus the result seems to be the time taken to implement the rises in the method.

So, therefore the other options are incorrect according to the following scenario.

4 0
3 years ago
Which of the following is an example of plagiarism? A. Listing someone as an author who did not actually contribute to the publi
Nata [24]

Answer:

C. <em>Presenting someone else’s ideas or words and claiming them as one's own.</em>

Explanation:

The correct option is <em>C. Presenting someone else’s ideas or words and claiming them as one's own. </em>

The definition of <em>Plagiarism </em>indicates that stealing and passing off ideas or words created and / or developed by others and pretending or signifying that such words or ideas are one´s one is considering an act of plagiarism.

3 0
3 years ago
Unauthorized use of computer system with a view to seeing or changing data is refered to as
Semmy [17]

Answer:

I believe hacking I don't know for sure you may want to see what someone else says

Explanation:

3 0
3 years ago
Other questions:
  • Codio Challenge Question (Python)
    6·1 answer
  • Write the definition of a class Telephone. The class has no constructors, one instance variable of type String called number, an
    9·1 answer
  • a student writes a prgroma to find the factorial of a number. the factorial for a number n is defined as the product of all whol
    10·1 answer
  • User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not
    12·1 answer
  • If the speakers are not working on a laptop, what could be the problem besides the speakers?
    5·1 answer
  • Helpppppppp!!!!!!!! Some program menus are the same in every program you open. Under the File menu, all of the following are the
    15·2 answers
  • MENCIONA ¿POR QUÉ SURGE EL CIVISMO TECNOLOGICO?
    6·1 answer
  • Because all the IEEE WLAN features are isolated in the PHY and ____________ layers, practically any LAN application will run on
    11·1 answer
  • Define a method named swapValues that takes an array of four integers as a parameter, swaps array elements at indices 0 and 1, a
    12·1 answer
  • Which two peripherals are not required to browse the internet?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!