1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bearhunter [10]
2 years ago
7

In a use case, an external entity, called a(n) _____, initiates a use case by requesting the system to perform a function or pro

cess.
Computers and Technology
1 answer:
gladu [14]2 years ago
4 0

The person that initiates a case by by the given process is called; an actor

<h3>What are functions or processes in data flows?</h3>

Dataflow is simply defined as the movement of data through a system comprised of software, hardware or a combination of both.

Now, in data flows, there are different types of functions or processes. However, the one in question specifically talks about initiating a use case by requesting the system to perform a function or process.

The person that does the above task is called an actor.

Read more about data flow at; brainly.com/question/19667078

You might be interested in
Suppose that you have created a program with only the following variables.int age = 34;int weight = 180;double height = 5.9;Supp
Yuri [45]

Answer:

a. calculate(age, weight); // This is legal

b. calculate(age, height); // This is legal

c. calculate(weight, height); // This is legal

d. calculate(height, age); // This is not legal

e. calculate(45.5, 120); // This is not legal

f. calculate(12, 120.2); // This is legal

g. calculate(age, size); // This is not legal

h. calculate(2, 3); // This is legal

i. calculate(age); // This is not legal

j. calculate(weight, weight); // This is legal

Explanation:

a. This is legal because the argument passed are two in numbers and they are integers but the integer for the second parameter can be cast to double.

b. This is legal because the method requires two parameter and two are passed. The method requires integer and double. The passed parameter are integer and double.

c. This is legal because the method requires two parameter and two are passed. The method requires integer and double. The passed parameter are integer and double.

d. This is not legal because even though two parameters were passed. The first one should be int but double was supplied and double cannot be downgraded to int. There is a possible lossy conversion from double to int.

e. This is not legal because even though two parameters were passed. The first one should be int but double was supplied and double cannot be downgraded to int. There is a possible lossy conversion from double to int.

f. This is legal because the method requires two parameter and two are passed. The method requires integer and double. The passed parameter are integer and double.

g. This is not legal because even though two parameters were passed. The first one should be int but the second parameter is not defined before been passed to the calculate method.

h. This is legal because the argument passed are two in numbers and they are integers but the integer for the second parameter can be cast to double.

i. This is not legal because only one parameter was passed instead of two.

j. This is legal because the argument passed are two in numbers and they are integers but the integer for the second parameter can be cast to double.

3 0
4 years ago
Suppose that the performance measure is concerned with just the first T time steps of the environment and ignores everything the
Jobisdone [24]

Answer:

the first T time steps are a factor in the performance measure. So for instance, if the environment is in state A at time step 1, the performance measure can be different than being in state A at step 2 since the state of the environment in step 1 is relevant to the performance measure in the latter case. Thus as the performance measures can be different, the rational agent may make different actions.

3 0
3 years ago
Which pair of Information Technology career fields may require work to be done outside of normal office hours? interactive media
scZoUnD [109]

Answer:

The answer to this question is "information services and support and network system administration".

Explanation:

The information support and service and network system administration is used to outside work, which can be explained as follows:  

  • The information support and service process is using information processing that is defined as the system for record-keeping, forms, figures and data in a business.  
  • A network or device system administrators are responsible for the day-to-day deployment of all these networks. They arrange, restore, and promote the computer systems of the company, which include local area networks, WANs, system sections, web services, and other wireless communication systems. The system provides local area networks.

6 0
4 years ago
Read 2 more answers
You have been asked to investigate a web server for possible intrusion. You identify a script with the following code. What lang
nignag [31]

The code below is written in JavaScript and does not seem malicious.

<h3>What is a Malicious Code?</h3>

A Malicious code is one that is not designed for any productive end but to cause disruptions in the computer with the objective of

  • harming the workstation; or
  • destroying the data stored therein.

There are numerous classifications of malicious codes and they can be identified and removed by an application called an Anti-Virus or malicious app remover.

Learn more about JavaScript at:
brainly.com/question/16698901

8 0
3 years ago
Which tag you will use to explain a set of in an HTML document?
Ahat [919]

Answer:

<p> </p>

Explanation:

3 0
4 years ago
Other questions:
  • Which of the following queries can have a Fully Meets result? Select all that apply. True False [adobe website], English (US) Tr
    7·1 answer
  • Which of the following is a Federal law that provides a definition of the term cyberterrorism and under which young people prima
    7·1 answer
  • In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for
    15·1 answer
  • Discuss the infrastructure necessary for the Internet of Things and Cloud computing to exist. What unique services does this ena
    7·1 answer
  • Evaluating algebraic expressions 8(x+2)when x =6
    7·1 answer
  • From Blown to Bits why is it important to know what children are doing on the Web Tonight?
    7·1 answer
  • A systems engineer suspects a new type of malware has impacted the company network. Which threat hunting approach does the engin
    7·1 answer
  • WHO SAYS BUP ALL THE TIME ​
    8·1 answer
  • Term of The surroundings and conditions of your workplace
    6·1 answer
  • I need a 75 word Radio Ad on Why Technology should be kept in a schools budget.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!