1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bonufazy [111]
3 years ago
14

Identify the programmer’s responsibility in maximizing the programs reliability by

Computers and Technology
1 answer:
Gekata [30.6K]3 years ago
6 0

Software has to be reliable so that it does not create conflict or negative feelings amongst those who use it.

In this world where humans increasingly rely on the internet and software for information, programmers have to take special care so as to ensure that the members of the society are not affected negatively.

For instance, there have been moments when software led to negative effects such as:

  • when Goøgle's algorithm tagged a black couple as gorillas
  • Facebøok's algorithm tagged black men as gorillas
  • Goøgle maps gave people the wrong directions

These are but a few instances where algorithms have messed up.

We can therefore conclude that it is important that programmers take extra care when designing programs so that they do not lead to negative feelings.

<em>Find out more at brainly.com/question/21328677.</em>

You might be interested in
Late at night, some traffic signals change patterns and become _____.
SCORPION-xisa [38]
The answer is B.

Late at night, some traffic signals change patterns and become flashing yellow or red lights.
4 0
3 years ago
Read 2 more answers
What type of computer is IBM 1401 ?<br><br>​
rjkz [21]

Answer:

The IBM 1401 is a variable-word length decimal computer that was announced by IBM on October 5, 1959.

7 0
3 years ago
Raul needs to ensure that when users enter an order into the tblOrders, the shipping date is at least two days after
bagirrra123 [75]

Answer:

input mask

Explanation:

Microsoft Access is a database application used to stored data. It is a relational database with rows and columns of data tables in its database.

Data validation is a tool in Access used to put a constraint on how data is entered in the table. The input mask is a data validation type that forces users to enter data in a specified format for a given field or column.

7 0
3 years ago
Read 2 more answers
HTML question please help
Pie

Answer:

background-color: (Color)

Explanation:

This is actually CSS coding, as you would code it like:

Body {

background-color: (Color)

}

5 0
3 years ago
The users in your organization bring their own mobile devices to the office and want to be able to access the network with them.
Afina-wow [57]

Answer:

The Windows feature that can be used to protect a network from malware threats that might be on the network user's mobile devices is;

Device Health Attestation (DHA)

Explanation:

Device Health Attestation (DHA) is a feature introduced in version 1507 of widows 10 that enables increased security of the network of enterprises to have mainly hardware which are attested and monitored using cloud based service health check or DHA service on Windows Server 2016.

Device Health Attestation carries out assessments on devices based on Windows 10 devices and Windows 10 mobile devices that work with TPM 1.2 or 2.0 and devices which are within the premises

Items checked include boot configuration and attributes such as Secure Boot, ELAM, and BitLocker

Corrective action are triggered by Mobile Device Management (MDM) based on report data from the DHA.

4 0
3 years ago
Other questions:
  • Web definition what means web
    9·1 answer
  • Which of the following matching is true concerning the Protocol Data Unit (PDU) and its corresponding OSI layer location?
    15·1 answer
  • You use a ____ following the closing brace of an array initialization list.
    12·2 answers
  • A server that provides data transfer and storage space at remote locations is called a
    7·1 answer
  • Using the _______ list, you can select the number of photos that will appear on each slide.
    13·1 answer
  • There are many different types of documents that are used to convey information in the business world-letters and
    12·1 answer
  • Type the correct answer in the box.
    5·1 answer
  • What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messag
    9·2 answers
  • You are setting up a home network for your friend. She has students visiting her home regularly for lessons and wants to provide
    14·1 answer
  • If an if-else statement is true, it will include which kinds of results?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!