1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
3 years ago
9

Assume that you have the business data in various sources such as Excel, .csv, text files and Access, Oracle databases. Write th

e steps that a developers follow when developing an integrated application that requires data from any or all of these sources. Also assume that a developer needs to build two different applications. One of these is a web application and another a GIS application. Briefly describe the process
Computers and Technology
1 answer:
garik1379 [7]3 years ago
5 0

Answer:

Explanation:

I believe the best process for this would be for the developer to create a class that has methods for opening up and reading all the data from each one of the sources. They should also add methods for easy manipulation, and writing to these files. This would allow the development team to easily reference this class and call the methods with a single line of code so that they can get and write the data from each individual source as needed. This design will also allow them to use all of these sources easily from any application by simply referencing the class and without having to change any code.

You might be interested in
Anyone know this awnser computer science
jolli1 [7]

Answer:

Smartphones, Satellite internet providers, smart speakers, and bluetooth headphones

Explanation:

6 0
2 years ago
Read 2 more answers
1. What is the Internet?
3241004551 [841]
A place to watch daisy Taylor vids
8 0
3 years ago
Read 2 more answers
An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul
WINSTONCH [101]

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

8 0
3 years ago
When youre working with a word processing document and you press the Del key what happens
REY [17]
Typically, "Del" stands for "delete."
Most times, this key will do different things depending on the type of keyboard/computer you have. For example, on macs, the "delete" key is also the backspace key, so it will delete the last character you typed. However, on most pcs, the "delete" key will delete characters you typed that are in front of your cursor.
5 0
3 years ago
After this week im gonna be moderator who ever needs help let me know
Sav [38]

Answer:

ok

Explanation:

thanks, for offering help through here. Have a nice day.

4 0
3 years ago
Other questions:
  • On computer X, a nonpipelined instruction execution would require 12 ns. A pipelined implementation uses 6 equal-length stages o
    9·1 answer
  • a corporation needs an operating system that allows the various teams in its office to network & collaborate on projects. wh
    11·2 answers
  • Can you get financial aid with average grades
    15·1 answer
  • In an income statement subtracting the cost of goods sold from the net sales provides the?
    11·1 answer
  • What is the web of trust
    7·2 answers
  • Suppose your name was George Gershwin. Write a complete main method that would print your last name, followed by a comma, follow
    9·1 answer
  • _____moves the head to proper track
    13·2 answers
  • What is a mod in programming?<br><br> Give more Java questions
    12·1 answer
  • write the definition of a class clock. the class has no constructors and one instance variable of type int called hours.
    12·1 answer
  • Complete the sentence based on the given information.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!