1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faltersainse [42]
3 years ago
10

Provide a status report to your classmates and instructor. Describe any modifications that you have made to the design or docume

ntation, discuss whether you encountered any new challenges or risks, and describe the mitigation strategy you implemented for addressing each risk. Are you meeting the objectives identified in your system proposal?What hardware, software, virtual desktop resources, and so on will you need to design and implement your system?What adjustments have you made to your document based on peer feedback?How do system components and applications interface and share data?In response to your peers, provide constructive feedback on their system design document progress and suggestions that they can incorporate into their documentation or projects. Is a sufficient amount of detailed information being provided to enable implementation by any skilled IT practitioner? Do you see any potential obstacles that they might come up against? If so, what approach can they take to overcome these challenges?When preparing your status reports, be sure that they are clear and well written. Engage your classmates in discussions that mimic the team dynamics expected in professional, real-world information technology project environments.Refer to the Discussion Rubric for directions on completing these discussions.
Computers and Technology
1 answer:
Pavel [41]3 years ago
3 0

Answer:

that's muddled up I can't make out the question

You might be interested in
PLEASE HELP ME GIVING BRAINLIEST!!<br> 3.4.3: Go Down Slide: Part one
AlekseyPX

                                           above

dgczjklcxhvzkojcvrhyujnhb

explanation:

7 0
2 years ago
Which of the following lines correctly defines a String variable
lidiya [134]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is C i.e. String s = "apluse";

The rule or syntax of declaring string in any programming language is given below:

String variable-name = "yourString";

For declaring string variable, first, you write "String" that is a keyword of a programming languages for declaring string variables, such as int before the variable name for declaring integer variable. Then, you need to write a meaningful name of the string as a variable. After string variable name, you need to put the equal operator and then write the string in double quotation("") marks and after that put the instruction terminator that is ";".

So, according to this syntax, option C is correct.

While other options are not correct because:

In option a, string is not encapsulated in double quotation. Option B does not have varaible type such as String and Option E does not have variable name and its value also. So, only option C is correct and all other except C are incorrect.

3 0
3 years ago
A desperate employee calls because she has accidentally deleted crucial files from her hard drive and can’t retrieve them from t
konstantin123 [22]

Answer: The file may have been lost due to incompatibility with the operating system, inadequate space on the hard disk drive, or through corruption of the recycle bin.

However, I will have to ask her the following questions:

- name of operating system she is utilizing,

- the time of deletion of files,

- the kind or extension of the deleted file,

- the model number of the computer,

- the size of files created after the deletion of files.

Also, sometimes, deleted files could be irretrievable due to security breeches. The employee may not have the required access to the crucial file but accidentally stumble upon it.

After all of these have been determined, then the error is fixed, and the document/file is restored, and becomes accessible to the employee.

6 0
3 years ago
Which line of code will use the overloaded multiplication operation?
maks197457 [2]

Answer:

def __mul__(self, b):

Explanation:

correct edge 2021

4 0
3 years ago
Code a program that gets all possible solutions of a string using 3 for loops. Actual question attached
Nikitich [7]

\tt x=int(input("Enter\:first\:no:"))

\tt y=int(input("Enter\:second\:no:"))

\tt z=int(input("Enter\:third\:no:"))

\tt for\:x\:in\: range (3):

\quad\tt for\:y\:in\:range(3):

\quad\quad\tt for\:z\:in\:range(3):

\quad\quad\quad\tt if\:x!=y\:and\:y!=z\:and\:z!=x:

\quad\quad\quad\quad\tt print(x,y,z)

8 0
2 years ago
Other questions:
  • Encryption that uses 16-character keys is known as ____. strong 128-bit encryption strong 256-bit encryption military-strength 5
    9·1 answer
  • Chat messages are most likely to be found where on a computer? firewall nic internet history ram
    7·1 answer
  • Which type of address is used at the transport layer to identify the receiving application?
    14·1 answer
  • Which tab in Microsoft Word provides access to the backstage view?
    8·2 answers
  • Which part of a computer takes the text and pictures on your screen and prints them onto paper?
    6·1 answer
  • It is necessary tto save updates often when working in google docs? True or false
    11·2 answers
  • Write an alogrithm to display the first ten even numbers​
    6·1 answer
  • The U.S. consumes lots of energy. Which fuel provides the most energy?
    15·2 answers
  • Which terms would be found in search for "Mo*”? Check all that apply.
    8·1 answer
  • Consider a game that is searched using random restart hill climbing strategy. Assume that the success rate for the game is 25%.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!