1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
joja [24]
3 years ago
6

What would provide structured content that would indicate what the code is describing ?

Computers and Technology
1 answer:
Elena-2011 [213]3 years ago
8 0

Answer: The answer is a.

Explanation:

You might be interested in
Consider what fact-finding techniques you would use to identify the important facts needed to develop a database system. Please
8090 [49]

Answer:

Examples of Fact-finding techniques includes:

  1. Prototyping
  2. Questionnaires
  3. Research and sites visit
  4. Interviews

Explanation:

It is important to note that a database system is a tool that allows users to define, create, maintain, and control access to a collection of logically related data and description of these data, designed to meet the information needs of an organization.

<u>Prototyping </u>

<em>Advantage:</em>  enables testing and understanding of the system in advance before final implementation of solution, while requiring less time for research.

<em>Disadvantage:</em> Training and Development cost consumes resources.

<u>Research and site visit </u>

<em>Advantage :</em> better time management if the problem has been researched upon before.

<em>Disadvantage:</em> appropriate permission is often needed before using research materials.

<u> Questionnaires </u>

<em>Advantage: </em>This technique is not expensive, and responses can be calculated and analysed quickly.

<em>Disadvantage:</em> There may be Incomplete answers received from users and body language of user cannot be observed.

<u>Interviews</u>

<em>Advantage:</em> The body language of interviewees is been perceived.

<em> Disadvantage: </em>Interviewing is time consuming and costly.

3 0
3 years ago
(20 points). Some matrixes have very special patterns, for example, in the following matrix, the numbers in the first row are eq
Nostrana [21]

Answer:

#include <iostream>

using namespace std;

void matrix(){

   int row = 5, col = 6;

   int myarr[row][col];

   for (int i = 0; i < 5; i++){

       for (int x = 0; x < 6; x++){

           if (i == 0){

               myarr[i][x] = (x+1)*(x+1);

          }else if ( x == 0){

               myarr[i][x] = (i+1)*(i+1)*(i+1);

           } else if ( i == x){

                myarr[i][x] = (i+1);

           } else{

                myarr[i][x] = myarr[i-1][x] + myarr[i][x-1];

           }

        }

   }

   for (int i = 0; i < 5; i++){

       for (int x = 0; x < 6; x++){

           cout<< myarr[i][x] << " ";

       }

       cout<< "\n";

}

}

int main(){

   matrix();

}

Explanation:

The C++ source code defines a two-dimensional array that has a fixed row and column length. The array is a local variable of the function "matrix" and the void function is called in the main program to output the items of the array.

3 0
2 years ago
What action should you take if you become aware that sensitive compartmented information has been compromised
irina [24]

The sensitive compartmented information can not be compromised and in case found with the incident it must be reported to the security officer.

<h3>What is Sensitive Compartmented Information?</h3>

The sensitive compartmented information is given as the sensitive information to the United States gathered with the source of the intelligence and the analytical process.

The information has been sensitive and was considered not to be compromised. In case the information is found to be compromised, the security officer of the information must be contacted to check into the details.

Learn more about sensitive information, here:

brainly.com/question/25948574

#SPJ1

5 0
1 year ago
Hello people, I was wandering if I could get some people to complete this questionnaire for my business course. It would be very
madam [21]
What do I have to do
3 0
3 years ago
Email Communication has it own set of etiquette guidelines for users to follow if they want to be effective communicators. Which
Olin [163]
You answer is most likely D.
5 0
2 years ago
Other questions:
  • The Modified Greiss chemical test is used to detect the presence of what chemicals that indicate muzzle to target distance?
    11·1 answer
  • A firewall, when properly implemented, can prevent most attacks on your system.
    11·1 answer
  • A tool you might use to manipulate an image, such as a photograph, into a seamless repeating texture would be:
    7·2 answers
  • Technician A says that the ECT and IAT sensors can be tested by using a digital multimeter or a scan tool. Technician B says tha
    12·1 answer
  • You would like to know how many cells contain data. Which function should you use?
    11·1 answer
  • The function below takes one parameter: a list of strings (string_list). Complete the function to return a new list containing o
    13·1 answer
  • Which memory can be removed from motherboard? RAM OR ROM?​
    11·1 answer
  • Ivan wants to have code in a game that will make it possible to change the speed of a swimmer in the game. Which of these does I
    8·1 answer
  • 1
    13·1 answer
  • 2 red and 2 overlapping balls in the center are surrounded by a green, fuzzy, circular cloud with a white line running through i
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!