1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wel
3 years ago
5

Match the roles to the task they perform.

Computers and Technology
1 answer:
balandron [24]3 years ago
6 0

Software Architects: “develop program code for software”

Business Analysts: “gather requirements”

Programmers: “create software framework”

Testers: “identify errors in the software”

You might be interested in
What does a computer use long-term memory, or ROM, for?
AysviL [449]
The answer is B

Explanation: In contrast, a computer's hard disk or SDD is its long-term memory, where things are stored more or less permanently. ... Nearly all computers also have some way to store information for longer-term access, too.

5 0
3 years ago
Grenstall Inc., a software development firm, has adopted a new job evaluation system in which managers are asked to objectively
rosijanka [135]

Answer:

Grenstall is most likely using the point system

Explanation:

The point system is a method of job evaluation system that involves measuring performance of workers in an organization and allocating points to identifiable factors such as skills, efforts, training, knowledge and experience based on its performance. It does not focus on entire job functions. The allocated points enables the organization to determine the compensation that is commensurate for a particular position.

Greenstall Inc uses the point system technique of job evaluation system for its managers as their jobs were broken down based on their skills, mental and physical efforts, training, and responsibility with points being allocated to each of these factors which are then summed up.  

7 0
4 years ago
What is telepresence
Vitek1552 [10]
The use of virtual reality technology, especially for remote control of machinery or for apparent participation in distant events.
7 0
3 years ago
A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also
bekas [8.4K]

Answer:

The security principle being referred to here is:

Resource Encapsulation.

Explanation:

Resource Encapsulation is one of the cybersecurity first principles.  It allows access or manipulation of the class data as intended by the designer. The cybersecurity first principles are the basic or foundational propositions that define the qualities of a system that can contribute to cybersecurity.  Other cybersecurity first principles, which are applied during system design, include domain separation, process isolation, modularization, abstraction, least principle, layering, data hiding, simplicity, and minimization.

7 0
3 years ago
In a computer instant messaging​ survey, respondents were asked to choose the most fun way to​ flirt, and it found that ​P(D)equ
MA_775_DIABLO [31]

Answer:

P(D) = 0.4

Explanation:

P(D) is the probability of randomly selecting someone.

who does not choose a direct​ in-person encounter as the most fun way to flirt.

1 – 0.600 = 0.4

P(D) = 0.4

hence the upper D over bar right parenthesis represent and its value is 0.4

8 0
3 years ago
Other questions:
  • This question involves the creation of user names for an online system. A user name is created based on a user’s first and last
    13·1 answer
  • "As part of integrating your solution your client indicates that they have certain technologies enabled on their network that al
    6·1 answer
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    7·1 answer
  • Persuasion is when Someone speaks to crowd about love <br>○True<br>○False​
    10·1 answer
  • Write a program with a function that accepts a string as an argument and returns the number of uppercase, lowercase, vowel, cons
    14·1 answer
  • Class C Airspace inner ring begins at the __________ and extends vertically (by definition) to MSL charted values that generally
    5·1 answer
  • Okay so I've have 10 Brainliest, through my whole time using brainly- I want people to get brainly and points so Im giving away
    6·2 answers
  • 1. what do to call the process of preserving food by soaking the raw ingredient in salt and water solution.
    14·1 answer
  • Assume that students in a course are required to produce a written report on an ICT-related
    14·1 answer
  • Different the policies and protocols in the industry
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!