Answer:
The program to question as follows:
Program:
PRINT "NEPAL", 'print message
PRINT ".EPA", 'print message
PRINT ".P", 'print message
Output:
NEPAL
.EPA
.P
Explanation:
In the above Qbasic program code, the three print function will be used to print the given pattern, that can be described as follows:
- The first time the print function is used, which uses a value, that is "NEPAL" to print its value.
- In the second time, again this function is used, that prints a value, that is ".EPA".
- In the last time, the print method accepts a value, which is ".P" to print its value. when the code is executed, it will print the given design.
Password is a very common approach to multisystem authorization. Passwords can be made up of a combination of letters, numbers, and special characters.
Anyone who has used a computer knows how to use a password, which is the most commonly used authentication method. Password-based authentication is the most simple for adversaries to exploit. Passwords are frequently reused, and guessable passwords are created using dictionary words and publicly available personal information. Two-factor authentication (2FA) is a security system that requires two distinct forms of identification to gain access to something. The first factor is usually a password, and the second is usually a text message with a code sent to our smartphone, or biometrics such as your fingerprint, face, or retina.
Learn more about password here-
brainly.com/question/14580131
#SPJ4
Answer:
WYSIWYG means "what you see is what you get ".
Explanation:
It is type of editor or program that helps while creating a document. This program allows us to see the end result while creating a document i terms of who document will look like after completion.
Answer:
1. FDD is a process and Analysts can use a FDD to create and use business functions and processes. It Requirements models are used when gathering requirements for a new system.
2. BPM is used on an ongoing basis for business process improvement. It is meant to improve order, insight and efficiency of the collective workflows that make up any given business process. BPM is meant to reduce any chaos within those collective workflows that make up a process and eliminate ad hoc workflow management. BPM means Business Process Management.
3. DFDs stands for Data Flow Diagram which will help software developers and designers to understand how they can take their next step to fit into the overall business process. DFDs paly key role for a successful requirements modeling.
4. UML can be used for modeling a system independent of a platform language. UML is a graphical language for visualizing, specifying, constructing, and documenting information about software-intensive systems. UML gives a standard way to write a system model, covering conceptual ideas.
Explanation:
Functional decomposition diagram (FDD) is used to identify functions and define their structure. It is a technique to decompose the complex problem into manageable pieces or individual elements to develop the application or product.
DFDs: It contains a process (shape) that represents the system to model, in this case, the "Food Ordering System". It also shows the participants who will interact with the system, called the external entities. In this example, Supplier, Kitchen, Manager and Customer are the entities who will interact with the system.
Unified Modeling Language (UML): Edraw UML Diagram is the application of choice for many software engineers and designers. The software is fully compatible with 64 and 32-bit Windows platforms from Windows XP to Windows 10.
Answer: On the same page
Explanation:
The CRM is basically stand for the customer relationship management that are design to support all the relationship with the customers. It basically analysis the data about the customers to improve the relationship and growth in the organization.
All the employees in the organization are directly and indirectly server the customers are basically o the Same page by the individual computers.
The CRM approach are basically compile the given data from the different communication source such as company website, email and telephone.