1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
2 years ago
6

Which of the following is NOT one of the three main ways to control a program when writing code?

Computers and Technology
2 answers:
Karo-lina-s [1.5K]2 years ago
5 0
B. Derivative (Sorry If It’s Wrong)
Klio2033 [76]2 years ago
5 0
The answer would be Derivative. I’ve never heard of derivate programming
You might be interested in
A​ client-server application that requires nothing more than a browser is called​ ________.
goblinko [34]
Hello  <span>Tacobell5401</span>

 Answer: A​ client-server application that requires nothing more than a browser is called​  thin-client application


Hope this helps
-Chris
3 0
3 years ago
Read 2 more answers
Explain Organizational approach to System Analysis and Design
9966 [12]

Answer:

The major goal of systems analysis and design is to improve organizational systems. Often this process involves developing or acquiring application software and training employees to use it. Application software, also called a system, is designed to support a specific organizational function or process, such as inventory management, payroll, or market analysis. The goal of application software is to turn data into information. For example, software developed for the inventory department at a bookstore may keep track of the number of books in stock of the latest best seller. Software for the payroll department may keep track of the changing pay rates of employees. A variety of off-the-shelf application software can be purchased, including WordPerfect, Excel, and PowerPoint. However, off-the-shelf software may not fit the needs of a particular organization, and so the organization must develop its own product.

Explanation:

Information systems analysis and design is a method used by companies ranging from IBM to PepsiCo to Sony to create and maintain information systems that perform basic business functions such as keeping track of customer names and addresses, processing orders, and paying employees. The main goal of systems analysis and design is to improve organizational systems, typically through applying software that can help employees accomplish key business tasks more easily and efficiently. As a systems analyst, you will be at the center of developing this software. The analysis and design of information systems are based on:

Your understanding of the organization’s objectives, structure, and processes

Your knowledge of how to exploit information technology for advantage

7 0
3 years ago
An “evil twin” in the context of computer security is: a) A virus-laden attachment that looks just like a sincere attachment b)
aleksandr82 [10.1K]

Answer:

A

Explanation:

3 0
3 years ago
Count from 1 to 20(base10) using the following bases: 8, 6, 5, 3.
Licemer1 [7]

Answer:

Base 8:

1, 2, 3, 4, 5, 6, 7, 10, 11, 12, 13, 14, 15, 16, 17, 20, 21, 22, 23, 24

Base 6:

1, 2, 3, 4, 5, 10, 11, 12, 13, 14, 15, 20, 21, 22, 23, 24, 25, 30, 31, 32

Base 5:

1, 2, 3, 4, 10, 11, 12, 13, 14, 20, 21, 22, 23, 24, 30, 31, 32, 33, 34, 40

Base 3:

1, 2, 10, 11, 12, 20, 21, 22, 100, 101, 102, 110, 111, 112, 120, 121, 122, 200, 201, 202

Explanation:

When counting on a certain base n you can only use n numerals (including the zero). So, if you count in base 8, you have 8 numrals, these are 0, 1, 2, 3, 4, 5, 6 and 7. The numeral 8 does not exist in base 8 the same as there is no numeral for 10 in base 10. When you're counting beyond the single numerals you add a 1 to the numeral in the column in front (which starts at zero) and reset the previous column.

4 0
2 years ago
How is a contact list different from an address book
WITCHER [35]
An address book has a list of addresses
7 0
3 years ago
Read 2 more answers
Other questions:
  • Into which of these files would you paste copied information to create an integrated document?
    13·2 answers
  • An investigator obtains consent and HIPAA authorization from subjects to review their medical records and HIV status. He plans t
    8·1 answer
  • When using a wireless mouse, what is the most common port used for the transmitter? 
    7·1 answer
  • Give three facts about the history of the train shongololo
    9·1 answer
  • Press the _______ key to move to the next cell in a row.
    5·1 answer
  • An identifier that is prefixed with an @ and allows you to use code written in other languages that do not have the same set of
    8·1 answer
  • . In the BorderLayout class, what are NORTH, SOUTH, EAST, WEST, and CENTER?
    15·1 answer
  • Technology has had
    10·1 answer
  • How are 1gls different from 2gls​
    10·1 answer
  • What year was internet inverted
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!