1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PolarNik [594]
3 years ago
15

Which of the following are common problems experienced with software applications?

Computers and Technology
1 answer:
dimulka [17.4K]3 years ago
6 0
1. Incorrect Calculations 2. Incorrect data edits 3. Ineffective data edits 4. Incorrect coding/implementation of business rules 5. Inadequate software performance 6. Confusing or misleading data 7. Software that is difficult to use 8. Obsolete software 9. Inconsistent processing 10. Difficult to maintain and understand 11. Inadequate security controls
You might be interested in
What is output by the following code? for x in range(7, 16): print(x * 2, end=" ") Group of answer choices 14 16 18 20 22 24 26
madreJ [45]

Input:-

\tt for\:x\:in\:range(7,16):

\tt print(x*2,end"")

Output:-

\tt 14,16,18,22,24,26,28,30,32

The loop will start from 7×2=14 to 16×2=32

8 0
3 years ago
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however,
tia_tia [17]

Answer: 443

Explanation:

Port 443 will need to be enabled for secure transactions to go through because it is the default port for HTTPS which is the transfer protocol for secure communication.

This way your credit card transactions will be encrypted to ensure protection from those who would seek to steal your data and your money.  

8 0
3 years ago
What are the different options in a page layout feature ? Select three options
Sever21 [200]

Answer:

Half Center Right Left, theres four

Explanation:

5 0
3 years ago
how many usable host addresses are available for each subnet when 4 bits are borrowed from a class C IP address
jonny [76]

Answer:

The answer is "14".

Explanation:

Let the IP address = 196.45.204.0

When it borrowed 4 bits

\therefore\\\\ subnet = 28

IP=  \frac{196.45.204.0}{28}\\\\ 28 \to 11111111.11111111.11111111.11110000

If the borrowed bits are left out then:

The Number of useable host addresses:

= {(2^4) - 2} \\\\ = 16-2\\\\ =14

3 0
3 years ago
Game have been a part of human life only recently in human history—about 1100 AD.<br> True<br> False
wariber [46]

Answer:

The answer is false it has not

7 0
3 years ago
Other questions:
  • A motor controller controls the and of the motors.
    9·1 answer
  • ____ uses markup to define the structure and layout of a web document.
    11·1 answer
  • Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output tho
    9·1 answer
  • How much do taxis coast?
    14·2 answers
  • You would like the user of a program to enter a customer’s last name. Write a statement thaUse the variables k, d, and s so that
    5·1 answer
  • What is the manufacturer’s specific ID for Intel Core?
    7·1 answer
  • Erik is the president and owner of Watch Out, a local website development company that helps clients create and build unique web
    15·1 answer
  • You need to secure your wireless network. which security protocol would be the best choice
    10·1 answer
  • in a typical e-mail address, the "host" is A. an account designated by a user name B. CPU processor 2500 C. the receiver of an e
    12·2 answers
  • HELP PLEASE!!!!!!!!!<br> Please fix the coding! thanks I give brainliest
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!