During the design phase of system development, you would acquire all the necessary hardware and software.
What is SDLC?SDLC is an abbreviation for system development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality systems.
In Computer technology, there are seven (7) phases involved in the development of a system and these include the following;
PlanningAnalysisDesignDevelopment (coding)TestingDeploymentMaintenanceAlso, phased implementation simply refers to an implementation methodology in which smaller portions of functionality of a system are typically implemented one at a time (one after the other).
In conclusion, we can infer and logically deduce that you would acquire all the necessary hardware and software during the design phase of system development.
Read more on phases here: brainly.com/question/7112675
#SPJ1
What line of code assigns a char variable outputgames with the value hte gamespointer points to?
The line of code that assigns a char variable outputGames with the value the gamesPointer points to is known to be:
outputGames = *gamesPointer:What is a line of a code?The instructions a programmer is known to often writes when making a program is known to be the code line.
Note that the Lines of code are seen as the "source code" of any kind of a program, and one line is one that can be used to make or generate a single machine instruction or a lot of it based on the programming language.
Hence, A line of code in assembly language is seen to be turned into a single machine instruction.
Therefore, The line of code that assigns a char variable outputGames with the value the gamesPointer points to is known to be:
outputGames = *gamesPointer:Learn more about codes line of code from
https://brainly.com/question/25875879
#SPJ1
A process called _____ examines the data packets that flow through a system and its associated devices to identify the most frequently used devices.
A process called traffic analysis examines the data packets that flow through a system and its associated devices to identify the most frequently used devices.
What is traffic analysis and why is it vital?Network traffic analysis (NTA) is known to be a kind of a way or a method that is often used in the monitoring network availability and it is also seen as an activity that one is engaged in so as to know or see anomalies, such as security and operational issues.
Note that the Common use are in regards to cases such as in the Collecting of what we call the real-time and historical record of the things that are happening on your network, and also in the Detecting malware such as ransomware issues or works..
Hence, A process called traffic analysis examines the data packets that flow through a system and its associated devices to identify the most frequently used devices.
Learn more about traffic analysis from
https://brainly.com/question/27227256
#SPJ1
What are the small squares that appear in the corners and in the middle of the sides of a selected object's border called?
The sizing handles is known to be the small squares that appear in the corners and in the middle of the sides of a selected object's border.
What is sizing handles in MS Word?The term sizing handles is known to be a tool that a person can use to be able to change a picture's size.
Note that if the mouse pointer is placed on a key that is of the sizing handles, the pointer alters to a double-headed arrow and a person can be able to then alter the size or shape of the image by dragging the sizing handle.
Note that it is often called handle, drag handle, sizing grip, resize corner, and therefore, The sizing handles is known to be the small squares that appear in the corners and in the middle of the sides of a selected object's border.
Learn more about sizing handles from
https://brainly.com/question/8806816
#SPJ1
What is the implementation methodology in which smaller portions of functionality of a system are implemented one at a time?
An implementation methodology in which smaller portions of functionality of a system are typically implemented one at a time (one after the other) is referred to as: D. phased implementation.
What is SDLC?SDLC is an abbreviation for system development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality systems.
In Computer technology, there are seven (7) phases involved in the development of a system and these include the following;
PlanningAnalysisDesignDevelopment (coding)TestingDeploymentMaintenanceGenerally, an implementation methodology in which smaller portions of functionality of a system are typically implemented one at a time (one after the other) is commonly referred to as phased implementation.
Read more on phased implementation here: https://brainly.com/question/7112675
#SPJ1
Complete Question:
What is the implementation methodology in which smaller portions of functionality of a system are implemented one at a time?
A. Direct cutover
B. Pilot implementation
C. Parallel operation
D. Phased implementation
Typically a personal computer uses a(n) ________ to store the operating system and software applications. group of answer choices flash drive external hard disk optical drive internal hard disk
Typically a personal computer uses a(n) internal disk to store the operating system and software applications.
What is internal disk?This is known to be a kind of tape, disk, optical that tends to drive or that is seen inside the case of any given desktop or laptop computer.
Note that An internal drive is one that gets its power from the central power supply and the other types of storage devices are:
RAM: Random Access Memory. ROM: Read-Only Memory. Magnetic Storage Devices.Therefore, Typically a personal computer uses a(n) internal disk to store the operating system and software applications.
Learn more about personal computer from
https://brainly.com/question/4945544
#SPJ1
Which join is made with the following query?
select * from demo1, demo2
A: Explicit inner join
B: Implicit inner join
C: Outer join
D: Cross join
The cross join is the type of join that is used to create the query.
What is a join statement?This is the term that is used in database programming in order to refer to the select statement that helps in the combination of the records that are contained in two different tables.
The condition that this is used to make happen is what is called the Join statement. There are different types of this type of condition. They are:
A: Explicit inner join
B: Implicit inner join
C: Outer join
D: Cross join
Read more on database here: https://brainly.com/question/518894
#SPJ1
Tcp is a connection-oriented protocol that uses a three-way handshake to establish a connection to a system port. computer 1 sends a syn packet to computer 2. which packet does computer 2 send back?
TCP as an connection-oriented protocol ]uses a three-way handshake to establish a connection to a system port and the packet that does the above i and 2 are: SYN/ACK
What is SYN and ACK?Client requests connection is one that is often done by sending SYN kind of (synchronize) message to the server.
Note that the Server is one that acknowledges by transmitting SYN-ACK (synchronize-acknowledge) message back to its client.
Hence, the Client often responds using an ACK ( which is an acknowledge) message, and the connection is said to be set up or established.
Hence, TCP as an connection-oriented protocol ]uses a three-way handshake to establish a connection to a system port and the packet that does the above i and 2 are: SYN/ACK
Learn more about TCP from
https://brainly.com/question/27742993
#SPJ1
The computer remembers the address of which indexed variable(s) in an array? ______
The Answer is:The first
If a client performs a stabilization workout on Monday, a power workout on Wednesday, and an SAQ sports workout on Saturday, what kind of periodization is being used for their mesocycle
When a client performs a stabilization workout on Monday, The kind of periodization that is being used for their mesocycle is Undulating periodization.
What is undulating periodization?Undulating periodization is known to be a kind of training that entails a lot of volume and intensity that often go up and down, and it is one that is often done weekly or daily, in course of the training period.
Note that a Weekly undulating periodization (WUP) alters the volume and intensity from week to week and this is also seen as a program that has a dynamic scheme that gives room for weekly and daily fluctuations.
Hence, When a client performs a stabilization workout on Monday, The kind of periodization that is being used for their mesocycle is Undulating periodization.
Learn more about periodization from
https://brainly.com/question/714921
#SPJ1
Your dashboard shows total cars sold by city. how will the data be impacted if you set a condition filter for sum of cars sold greater than 100?
The data be impacted if you set a condition filter for sum of cars sold greater than 100 as the dashboard will only depict the cities that has more than 100 cars are sold.
What is filter pf pages or picture?Image or page filtering is known to be the act of altering or changing the form of an image and also reducing a page to the items that one wants.
Note that in filtering, it tends to bring about those areas that one has interest in and as such, in the case above, The data be impacted if you set a condition filter for sum of cars sold greater than 100 as the dashboard will only depict the cities that has more than 100 cars are sold.
Learn more about filter from
https://brainly.com/question/3198358
#SPJ1
Brendan is examining a report using the design view. which section in the design view is going to appear only once on the first page and could contain logos and title information? page header page footer report header report footer
Answer:
report header
Explanation:
,,,,,,,,,,,
What is a counter? In typography
answer:
in typography, it is an area entirely or partially enclosed by a letter form or a symbol
explanation:
・two types: closed & open
・closed — A, B, D, O, P, Q, R, a, b, d, e, g, o, p, and q
・open — c, f, h, s
What is the difference between a field and an infoobject? What is the advantage of using infoobjects instead of fields in an adso?
The difference between a field and an infoobject as well as its advantages is given below.
What is the difference between InfoObject and adso?The difference between Infoprovider and ADSO can be seen when we tell about the definition of both.
Note that Info Providers are known to be tools that are often used to save the data in SAP BW system. Info Providers are said to be the objects that can be seen in BW, which are saving data physically or virtually and it is one that give access to the data and can also be in the assessment for reporting issues.
In terms of ADSO , it is one that Corporate memory and it is one that helps a person to be able save the full history of the data that can be used for reconstruction purposes, and it is one where a person do not need to to extract it all from the source system.
What is the advantage of using infoobjects instead of fields in an adso?Modeling InfoObjects brings is one that gives a lot of additional effort when compared to ADSO . ADSO is one that helps or enables you to be able to compress your data, thereby lowering the total data footprint.
Learn more about InfoObjects from
https://brainly.com/question/1382377
#SPJ1
The computer-like model used to describe the way humans encode, store, and retrieve information is the ________ model.
Answer:
Information processing model
Hope it helps!
The presence of a lock icon next to an item on the lenovo support site denotes a restricted document or utility. What information on lenovo support is considered restricted?
The information on Lenovo support which are considered restricted include the following:
BIOS toolsConfidential tips.Known issues for Contact Centers.What is a computer?A computer can be defined as an electronic device that is designed and developed by a tech company such as Lenovo, to receive data in its raw form as an input and it processes these data into an output (information), which can be used to perform a specific task through the use of the following computer parts:
KeyboardNetworkMonitor screenMouseWhat is a classified source material?A classified source material can be defined as an information source that comprises very important, restricted, and sensitive information that must only be shared and disseminated secretly with authorized persons.
In this context, we can infer and logically deduce that the information on Lenovo support which are considered restricted include the following:
BIOS toolsConfidential tips.Known issues for Contact Centers.Read more on classified source material here: https://brainly.com/question/15346759
#SPJ1
You have an application that renders videos for your online business. You want to make sure that the application continues to receive adequate attention from the system CPU, even if you open other applications. How can you adjust the amount of attention given to that application
Step 1 :- Open the Task Manager.
Step 2 :- Find the task of the required app.
Step 3 :- Right click on the video renderer task and select "Set Priority" and set it to High or Medium as required.
This is how we can adjust the amount of attention given to that application.
A _____ standard describes the requirements for obtaining a domain name for use by external parties?
A DNS control standard describes the requirements for obtaining a domain name for use by external parties.
What is a domain name?A domain name is a name that is easy and easy to remember. The name is used for online websites for companies or vlogs that contain an IP address on the internet. It is like the street address.
The DNS control system is a system that is used by every domain name user. It controls how visitors would see the website and how they will receive emails.
Thus, the standard requirement for obtaining a domain name is the DNS control standard.
To learn more about the domain name, refer to the below link:
https://brainly.com/question/3044569
#SPJ1
A(n)__________is a confirmed event that compromises the confidentiality, integrity, or availability of information. a. operational deviation b. threat c. breach d. residual risk
In information security, a breach is a confirmed event that compromises confidentiality, integrity, or availability.
What is a breach?A breach occurs when an obligation or promise is not fulfilled. An act of breaking laws, rules, contracts, or promises; a violation of the basic laws of humanity; a violation of a law; a breach of a promise. The factions hoped to avoid a break in relations; "they hoped to avoid a break".
Therefore, the option C, which is our answer.
To learn more about breach, here
https://brainly.com/question/13885689
#SPJ1
What is the difference between true experimental designs and quasi-experimental designs?
The main difference between true experimental designs and quasi-experimental designs is that rue experimental designs use random assignments and quasi-designs do not.
What is an experimental design?An experimental design is any type of procedure during experimentation used to test a given explanation of a hypothesis by employing the scientific method.
Experimental designs are randomized in order to avoid any type of biases that may alter the collected data from the sampling method.
In conclusion, the main difference between true experimental designs and quasi-experimental designs is that rue experimental designs use random assignments and quasi-designs do not.
Learn more about experimental designs here:
https://brainly.com/question/17280313
#SPJ1
Question 5 of 10
What happens when you create a variable in a video game program?
OA. You hold a spot in the computer's memory for a piece of data that
it will need later.
OB. You save a copy to your computer that you will be able to return to
later.
OC. You change the parameters of the program so the game will look
different.
OD. You create a new event that will run as soon as the game's
program starts.
SUBMIT
Answer:A
Explanation:just got it right
When you create a variable in a video game program you may hold a spot in the computer's memory for a piece of data that it will need later. Thus, the correct option for this question is A.
What is meant by variable in programs?In programming, a variable is a value that can be modified or altered with respect to the conditions or the nature and type of information that have to be passed onto the program.
According to the context of this question, a variable has multiple functions in the sequence of programming. These variables are utilized in order to store information that has to be referenced and manipulated within a computer program. Another function of variable is that they also provide a way of labeling the components of programming.
Therefore, you may hold a spot in the computer's memory for a piece of data that it will need later is the action of a variable that you create in a video game program. Thus, the correct option for this question is A.
To learn more about Variable in programming, refer to the link:
https://brainly.com/question/9238988
#SPJ2
The types of ____ systems used with personal and business computers today include smart cards.
Answer:
Storage.
Explanation:
I ran into this question before
Answer:
Storage
Explanation:
I've seen this question in a quiz before.
The ____ is usually on the right side of the taskbar and displays open services.
The system tray is usually on the right side of the taskbar and displays open services.
What is the system tray known for now?The official name for that which is found in the bottom of the screen is known to be called a “taskbar”.
Note that the taskbar is said to be made up of a number of elements, such as the “Start Button”, and others.
The system tray (or known to be "systray") is said to be an aspect of the taskbars in the Microsoft Windows operating system (OS) user interface that helps one to have a kind of easy access icons to the most commonly used apps.
Therefore, The system tray is usually on the right side of the taskbar and displays open services.
Learn more about system tray from
https://brainly.com/question/17667656
#SPJ1
Checks or safety procedures are put in place to protect the integrity of the system is referred to as?
answer:
system controls
The most common format used for data modeling is: A. logic modeling. B. process modeling. C. entity-relationship diagramming. D. a flowchart. E. state-transition diagramming.
The most common format used for data modeling is C. entity-relationship diagramming.
What is Data modeling ?Data modeling in software engineering can be regarded as the process involving the creation of a data model that is been used in processing information system by applying certain formal techniques.
It should be noted that there are different types of modelling but The most common format used for data modeling is C. entity-relationship diagramming.
Learn more about Data modeling on:
https://brainly.com/question/27250492
#SPJ1
Write a raptor program that will display the count from 100 to 0 in decrements of 5.
A raptor program that will display the count from 100 to 0 in decrements of 5 is shown below.
What is a raptor program?This refers to a programming environment that works on a flowchart basis to help the user to present their algorithms in a visual manner.
Using a raptor program, you can display a count from 100 to 0 in decrements of 5 as shown:
#include <iostream>
#include <string>
using namespace std;
int main()
{
int count;
Count =100;
while (Count<=0)
{
cout << Count << endl;
Count =Count-5;
}
return 0;
}
The result would be a list showing numbers that go from 100 to 0 in decrements of 5.
Find out more on raptor programs at https://brainly.com/question/15082977
#SPJ1
list the different services provided by computer network
Answer:
access to the World Wide Web, digital video, digital audio, shared use of application and storage servers
PKI is the a federal information processing standard that specifies a cryptographic algorithm developed to replace both DES and 3DES. _____ Group of answer choices
The assertion that PKI is a federal information processing standard that specified an algorithm to replace DES and 3DES is FALSE.
Why is this false?The Public Key Infrastructure (PKI) is a framework which is used to support encryption, and authentication of certificates so that businesses are secure.
There is a federal information processing standard which is used to specify a cryptographic algorithm and this standard. This then replaced DES and 3DES. It is called the Advanced Encryption Standard (AES).
Find out more on the Public Key Infrastructure at https://brainly.com/question/10651021
#SPJ1
A ____ attack is much more substantial than a dos attack because of the use of multiple systems to simultaneously attack a single target.
Answer:
ddos
Explanation:
DDOS (Distributed Denial Of Service) is more effective becaause it utilizes many computer systems for the attack, mostly botnets.
Cidr simplifies how routers and other network devices need to think about the parts of an ip address, but it also allows for more arbitrary network sizes. what does cidr stand for?
CIDR stands for Classless Inter-Domain Routing.
What is CIDR?
CIDR is an acronym for Classless Inter-Domain Routing, and it is considered a method for allocating IP addresses and for routing.
It was in 1993 that CIDR was introduced by the Internet Engineering Task Force, and since then this method has been used to replace the previous architecture that addressed networks.
Its main function was to slow down the growth of the tables that contained the routings of the routers in the network. In this way, it was possible to help slow down how quickly IPv4 addresses were reaching.
See more about computing at: brainly.com/question/13805692
#SPJ1
When a database stores view data, it uses a _____ that depends on data in a corresponding _____.
When a database stores view data, it uses a materialized view that depends on data in a corresponding view table. The correct option is 4.
What is a database?A database is a collection of data in an organized and easy way. They store electronic data and manipulate it. An example is an online telephone directory that saves people's contact, name, and addresses.
The materialized view is an organized view of data in the system, and the view table is the table where all the data can be viewed.
Thus, the correct option is 4. Materialized view, view table.
To learn more about the database, refer to the below link:
https://brainly.com/question/25198459
#SPJ1
The question is incomplete. Your most probably complete question is given below:
1. base table, view table
2. materialized view, base table
3. view table, materialized view
4. materialized view, view table