1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goblinko [34]
3 years ago
14

Identify six specific skills that a computer software engineer is expected to demonstrate.

Computers and Technology
2 answers:
Brrunno [24]3 years ago
8 0

1.) Team work

2.) Disciple

3.). Creativity

4.) Attension To Deatil

5.) Time Mangament

Explanation:

taurus [48]3 years ago
3 0

Answer:

A computer programmer needs to demonstrate that they are:

1. A team player

2. Able to meet deadlines

3. Able to solve problems logically and efficiently

4. Able to create programs that fulfill their intended purpose

5. Able to be flexible (do many different types of jobs)

6. Able to adapt to new changes and be able to learn new skills

Explanation:

Computer programmers are tasked with creating software that works effectively with the given hardware and the people using it, and to do that, they have to be very skilled in many areas.

You might be interested in
While your hands are on home row, your left hand rests lightly on _____.
In-s [12.5K]
The answer is b. asdfc.  
8 0
3 years ago
Read 2 more answers
Which is the correct description of the first act in a classical game story structure?
Reil [10]
The 3-act structure<span> is an old principle widely adhered to in storytelling today. It can be found in plays, poetry, novels, comic books, short stories, video games, and the movies. It was present in the novels of Conan Doyle, the plays of Shakespeare, the fables of Aesop, the poetry of Aristotle, and the films of Hitchcock. It’s older than Greek dramaturgy. Hollywood and Broadway use it well. It’s irrefutable and bullet-proof, so to speak.

so this means its more basic antagonist protagonist set-up even if the protagonist and antagonist are "CUBES"</span>
5 0
4 years ago
On a client/server network, data does not necessarily follow the same path between the request (client) and the response (server
Andrej [43]

Answer:

SSL and HTTPS play a factor

6 0
3 years ago
Write the include directive needed to allow use of the various i/o functions and values such fprintf and fgetc.
noname [10]

#include <stdio.h> //stdio stands for STanDard Input/Output

5 0
4 years ago
Do individuals have a privacy interest in their smartphones' locations?
Rzqust [24]

Answer:

In today's world, everyone using smartphones as it easily allow to communicate by using different types of features like texting, video, e-mail and by using internet we can run various types of applications.

Smartphones carries one of the main and important skills that is show our current location. By using various types of applications like Global positioning system (GPS), cell ID and wifi we can easily trace the location.

But there is different types of option according to the individual requirement as some people want privacy as they are not interested to share their location to anyone.

6 0
3 years ago
Other questions:
  • If an occupation is projected to grow by 13% over the next 10 years, how would you rate the job outlook?
    7·2 answers
  • Bullets in a text box will do which of the following?
    9·1 answer
  • A5.3 1012 kg satellite is 1,800 m from another satellite that has a mass of 3.5 x 108 kg. What is the gravitational
    6·1 answer
  • 2. What is the layout of the modern keyboard known as?
    13·1 answer
  • What is required for real-time surveillance of a suspects computer activity?/p Group of answer choices a. Blocking data transmis
    12·1 answer
  • __________ is a program that lets you share documents online with others.
    12·2 answers
  • Write a parent program to fork(2) n processes where n is passed tothe program on the command line, and n can be from 1 to 10. Al
    12·1 answer
  • Jin needs to add a row into his spreadsheet, but he does not want to remove any existing data. Which combination of options shou
    6·2 answers
  • )finding an unused location in the hash table is called
    5·1 answer
  • Pls help
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!