1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
2 years ago
5

takes the perspective that a program describes what the solution to a problem is, not how that problem is solved. Select one: a.

Interpretive programming b. Resolution c. Declarative programming d. Unification
Computers and Technology
1 answer:
SashulF [63]2 years ago
8 0

Answer:

c. Declarative programming

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

Some of the models used in the software development life cycle (SDLC) are;

I. A waterfall model.

II. An incremental model.

III. A spiral model.

In Computer programming, when a software program or application describes what the solution to a problem is but without highlighting (describing) how that problem is solved, it is generally referred to as declarative programming. Thus, it takes the perspective that software developers (programmers) define what needs to be accomplished by a software program or application to solve a problem without defining how that problem is solved.

You might be interested in
What is your personal definition of life? How do you appreciate life?​
kompoz [17]
The definition of life is to fulfill your purpose.To accomplish your goals and enjoy life.Appreciate the little things that happen in your life and look out for others and love unconditionally.Have a positive attitude in life.Love Yourself!
3 0
2 years ago
A user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file se
inysia [295]

Answer:

gpresult

Explanation:

Group Policy provides the system administrator with settings that would be necessary to manage the different user accounts available in an organization. It also controls their work environment centrally by configuring the user Operating System (OS), applications and user accounts.

Group policy settings or configurations are referred to as Group Policy Objects (GPOs). These objects can be linked to organizational units (OUs), domains or sites.

There are various group policy commands such as;

  1. rstrui (System Restore tool will run),
  2. runas (using different permission to run a tool or program),
  3. tasklist (currently running programs are shown
  4. gpupdate (Group policies are refreshed)
  5. gpresult (group policy configurations are displayed for verification)

gpresult command can be used to verify the group policy configurations for adjustment or optimization. The technician can start troubleshooting from viewing the active settings, then running the rstrui to start the System Restore utility to restore the computer to an earlier date

6 0
2 years ago
Help pls. Computer basics.
telo118 [61]
Text boxes and related tools
8 0
3 years ago
Read 2 more answers
An organization using Robotic Process Automation (RPA) wishes to verify the quality and results of their automated processes to
damaskus [11]

Answer:

Control Center

Explanation:

The element of RPA (Robotic Process Automation) an organization should use to manage and track their automated processes is known as CONTROL CENTER.

Robotic Process Automation has various elements including:

1. Recorder

2. Development Studio

3. Plugin/Extension

4. Bot Runner

5. Control Center

Among these elements are however is the CONTROL CENTER which is considered the most significant element and functions as source control.

It enables the users to plan, manage, control, and measure the movement of a huge amount of digital actions.

4 0
2 years ago
A(n) _____ is similar to a virus, except that it is an independent program that can be spread across computer networks without b
CaHeK987 [17]
The term you're looking for is worm
5 0
3 years ago
Other questions:
  • Music voice and sound effects can all be recorded and stored on a computer as
    15·1 answer
  • 1. How does inertia affect a person who is not wearing a seatbelt during a collision? 
    14·2 answers
  • Which network topology requires terminators at the ends of the backbone cable?
    6·1 answer
  • If we have a priority queue storing approximately million numbers, and the bottom level is "full", which of the following statem
    9·1 answer
  • How people have contributed to the advancement of science
    7·1 answer
  • ICT excel data homework
    10·1 answer
  • The merge sort algorithm sorts using what technique?
    8·1 answer
  • If you give an actual answer I'll give brainliest​
    13·2 answers
  • How does a passive attack differ from an active attack?
    8·1 answer
  • A mesh network topology allows all computers to be directly connected. True or False
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!