1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
3 years ago
15

Advantages of a software

Computers and Technology
2 answers:
Sindrei [870]3 years ago
5 0

Simplified decision-making. Obtaining one complete view by integrating your software systems simplifies the decision-making process. ...

Increased productivity

More reliable data

Enhanced analysis

Improved data security

Better customer service

Increased sales potential

Dovator [93]3 years ago
3 0

Answer:

Simplified decision making. Obtaining one complete view by integrating your software systems simplifies the decision making process. ...

Increased productivity. ...

More reliable data. ...

Enhanced analysis. ...

Improved data security. ...

Better customer service. ...

Increased sales potential.

Explanation:

Brainliest?  

You might be interested in
You want to securely erase data from your hard drive what can you use to do this and what is the process called
tankabanditka [31]
You could Factory Reset a computer or you could smash it with  a hammer
7 0
3 years ago
Read 2 more answers
Many large IT departments use a(n) _____ team that reviews and tests all applications and systems changes to verify specificatio
mafiozo [28]

Answer:

Quality assurance team

Explanation:

Software development life cycle (SDLC) is a process or stages of processes a software application must go through to be materialized. The stages of SDLC are planning, design, implementation or development, testing or verification, deployment and maintenance.

An implemented software design must be tested. It is tested based on the pre-dertermined design and the quality standard of the company. A group of test expect are approached for this purpose, they are called the quality assurance team

They are equipped with skills to use third party applications to analyze and verify the quality of the developed software.

6 0
3 years ago
What is the preferences of occupation in ones life?
umka21 [38]

Answer:

mark me brai list i request u

6 0
3 years ago
Find the mean median mode and range of the data set <br> 11, 13,11,12 10 ,12,11,8
denpristay [2]

Answer:

Mean: 11

Mode: 11

Median: 11

Explanation:

7 0
3 years ago
1. Assume that word is a variable of type String that has been assigned a value . Assume furthermore that this value always cont
s2008m [1.1K]

Answer:

1.word = "George slew the dragon"

startIndex = word.find('dr')

endIndex = startIndex + 4

drWord = word[startIndex:endIndex]

2. sentence = "Broccoli is delicious."

sentence_list = sentence.split(" ")

firstWord = sentence_list[0]

Explanation:

The above snippet is written in Python 3.

1. word is initialized to a sentence.

Then we find the the occurence of 'dr' in the sentence which is assign to startIndex

We then add 4 to the startIndex and assign it to endIndex. 4 is added because we need a length of 4

We then use string slicing method to create a substring from the startIndex to endIndex which is assigned to drWord.

2. A string is assigned to sentence. Then we split the sentence using sentence.split(" "). We split based on the spacing. The inbuilt function of split returns a list. The first element in the list is assigned to firstWord. List uses zero based index counting. So. firstWord = sentence_list[0] is use to get first element.

4 0
3 years ago
Other questions:
  • In Python, what kind of error is returned by the following code? (e.g. NameError, ValueError, IOError, etc.) def my_func(n1, n2)
    8·1 answer
  • A model release can be either oral or written down. true or false
    11·2 answers
  • What is the statement describing? Agile team continuously adapt to new circumstances and enhance the methods of value delivery
    6·1 answer
  • While surfing online, Patricia checks her email and reads the latest messages. She then browsers a website and logs in a comment
    8·1 answer
  • They have outlined their technical needs and have sent some of the documentation along with the potential provider's SLAs and te
    14·1 answer
  • Most C++ catastrophe vulnerabilities rely on uninitialized function pointers in a class.
    13·1 answer
  • Which type of protocol allows for a secure data transmission using encryption methods?
    7·1 answer
  • Question: 11
    10·1 answer
  • Tại sao xe chỉ sản xuất ra 1996cc mà không phải là 2000cc?
    6·2 answers
  • Which of the following statements best explains how multitasking works in the human mind?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!