1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makvit [3.9K]
3 years ago
10

When an organizatin needs a program to do a very specific job, it mayhire someone to write _____ software.​

Computers and Technology
1 answer:
Harman [31]3 years ago
8 0
Code sofware your welcome
You might be interested in
What is the red wavy underline beneath the text
8_murik_8 [283]
It means that you spelled the word wrong, if you click on it you might be able to find the right way to spell it

7 0
3 years ago
What type of power flaw involves a fluctuation in voltage levels caused by other devices on the network or by EMI?
HACTEHA [7]

Answer:

noise is the correct answer for the above question.

Explanation:

  • The noise is a term which is a barrier in the network of communication. It forces the signals to make a delay in data transfer. It is caused by any device or mechanism.
  • For example, if any data is transferring, but some device makes fluctuation in wire, then the communication voltage is disturbed.
  • The above question asked about the term which born with the help of some devices and it caused the fluctuation in the voltage. So the term is known as noise.
4 0
4 years ago
Write a class named Averager containing: An instance variable named sum of type integer, initialized to 0. An instance variable
vladimir1956 [14]

Answer:

The answer to this question can be given as:

Class definition:  

public class Averager  //define class Average.

{

private int sum = 0;

 //define variable sum.

private int count = 0;

 //define variable count.  

public int getSum() //define function getSum().

{

return sum;  //return value.

}

public void add(int x)

//define function add().

{

sum = sum + x;   //calculate sum

count=count+1; //increase value of count.

}

public int add(int x)

 //define function add().

{

return count;  //return value.

}

public double getAverage()  //define function getAverage().

{

return (double)sum/count;  //return value

}

}

Explanation:

The above class definition can be described as:

  • In the above class definition first we define a class that is " Averager". In this class we define two integer variable  that is "sum and count"  and assign a value that is 0. Then we define a functions :
  • First we define getSum() function in this function we does not pass any value and the return type of this function is int that will return an integer value.
  • Then we define add() function we use this function two times but both functions have different from each other.  
  • In first time implementation, we define this function and the return type of this function is void which means it does not return any value. In this function, we calculate the sum value and increase the value of the count variable by 1.  
  • In second time implementation, we define this function and the return type of this function is int which means it will return a value. In this function, we will return the count variable value.
  • At the last, we define a getAverage() that calculates the average of the added values in the sum variable and returns its value.
3 0
3 years ago
How many functions can Excel perform?
Vlad [161]

Answer:

G

Explanation:

because

3 0
4 years ago
Routing and remote access services allow users to connect to private networks using or:.
Luda [366]

Answer:

Users can connect to a remote access server through a dial-up connection or a virtual private network (VPN) connection.

Explanation:

A dial-up connection requires both the server and the client computer to have a correctly configured modem. The client and the server connect over analog public telephone networks. To enhance the security of a dial-up connection, use data encryption, Windows logon and domain security, remote access policies and callback security.

8 0
2 years ago
Other questions:
  • Individually or in a group find as many different examples as you can of physical controls and displays.a. List themb. Try to gr
    15·1 answer
  • Write a Java method that will take a string and reverse it. Can you come up with a method that is faster than regular reversing
    7·1 answer
  • Clicking on the Spelling & Grammar button is one way to correct a spelling error in Word. Please select the best answer from
    7·2 answers
  • You are considering creating a mobile app. Describe a basic statement for the app you would create and whether your app should b
    7·1 answer
  • The most common Unicode transformation formats are UTF- ______ and UTF-16.
    9·1 answer
  • Nancy finds it difficult to locate emails in her Inbox. What action should she take to locate a particular type of email instant
    10·1 answer
  • Rosa has received reports by several users that one of the Linux servers is no longer accessible. She is able to remote into the
    10·1 answer
  • Look out for users with this photo.
    15·2 answers
  • ¿Por qué en Colombia la mayoría de las empresas no son automatizadas (manejadas por computadoras y robots?
    15·1 answer
  • Which situation is the best choice for using telehealth?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!