1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoray [572]
3 years ago
6

Explain the four (4) important attributes that all professional software should have. ​

Computers and Technology
2 answers:
Arturiano [62]3 years ago
4 0

Answer:

1. Maintainability

2. Dependability and security

3. Efficiency

4. Acceptability/Usability

Explanation:

Maintainability, dependability and security, efficiency (performance), and acceotability/usability are the four most critical characteristics. Reusability (can it be reused in other applications), distributability (can it be distributed over a network of processors), portability (can it operate on multiple platforms, such as laptop and mobile platforms), and inter-operability (can it communicate with other systems) are all important attributes to consider (can it work with a wide range of other software systems).

ps. i would really appreciate it if you mark me as brainliest:> (i'm trying to reach virtouso) but it's fine if u don't.

hope this helps

Mashcka [7]3 years ago
3 0

Answer:

Acceptability, Dependability and Security, Efficiency, and Maintainability.

Explanation:

Acceptability, Dependability and Security, Efficiency, and Maintainability.

You might be interested in
You have enabled IP routing on PLABSA01 after enabling the IPRouter in the registry. How will you verify whether the IP routing
drek231 [11]

Answer:

By typing ipconfig at the command prompt

Explanation:

To check if an ip router is enabled in a registry, simply do the following:

1. launch your command prompt from accessories in your windows start button

2. Type this command IPconfig

3. Strike the enter button on the keyboard

It will display the various pack of upload and download indicating how packages are routed.

4 0
3 years ago
This is due in like an hour but I'm confused so please do lend assistance
blagie [28]
Yes you do have to program it first.
4 0
3 years ago
Create a flowchart that assigns a counselor to a student.
Nataly [62]
Please Help! Unit 6: Lesson 1 - Coding Activity 2
Instructions: Hemachandra numbers (more commonly known as Fibonacci numbers) are found by starting with two numbers then finding the next number by adding the previous two numbers together. The most common starting numbers are 0 and 1 giving the numbers 0, 1, 1, 2, 3, 5...
The main method from this class contains code which is intended to fill an array of length 10 with these Hemachandra numbers, then print the value of the number in the array at the index entered by the user. For example if the user inputs 3 then the program should output 2, while if the user inputs 6 then the program should output 8. Debug this code so it works as intended.

The Code Given:

import java.util.Scanner;

public class U6_L1_Activity_Two{
public static void main(String[] args){
int[h] = new int[10];
0 = h[0];
1 = h[1];
h[2] = h[0] + h[1];
h[3] = h[1] + h[2];
h[4] = h[2] + h[3];
h[5] = h[3] + h[4];
h[6] = h[4] + h[5];
h[7] = h[5] + h[6];
h[8] = h[6] + h[7]
h[9] = h[7] + h[8];
h[10] = h[8] + h[9];
Scanner scan = new Scanner(System.in);
int i = scan.nextInt();
if (i >= 0 && i < 10)
System.out.println(h(i));
}
}
4 0
3 years ago
Read 2 more answers
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
What is the missing line of code to have the following output?
dangina [55]

The missing line of code to have the following output is console log ("\'hi").

<h3>What are codes?</h3>

Codes are the rules in an information system that converts the information such as image, text from communication language to other language that is secret and only can understand by the system.

Thus, the missing line of code to have the following output is console log ("\'hi").

Learn more about codes

brainly.com/question/17293834

#SPJ1

3 0
2 years ago
Other questions:
  • Controls that are used to assess whether anything went wrong, such as unauthorized access attempts, are called ________ controls
    5·2 answers
  • Physical activity such as sports or even a brisk walk can help reduce
    7·2 answers
  • State the seven common measures of queuing system performance ? State the assumptions of the “basic” single-server queuing model
    10·1 answer
  • Andrina writes letters that are regularly sent to hundreds of her company’s customers. Because of this, she would like for the M
    5·1 answer
  • What would be the desired output of the home-security system
    8·1 answer
  • Using examples, evaluate the open source model of software development. In your discussion highlight some of its advantages and
    12·1 answer
  • What is a filter in excel (please keep your answer brief)
    11·1 answer
  • What is being identified when antibodies stick to pathogens during immunostaining?
    11·1 answer
  • ONLY ANSWER IF YOU KNOW HOW TO WRITE THIS CODE
    14·2 answers
  • class Login: def __init__(self): self.login_name = 'none' self.login_password = 'none' # TODO: Define class method - check_crede
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!