Which is the responsibility of a software architect?

A. to gather and analyze requirements
B. to organize team meetings and prepare status reports
C. to code the software using design documents
D. to ensure that the software adheres to technical standards

Answers

Answer 1

Answer:

D

Explanation:


Related Questions

The theft and/or destruction of information, resources, or funds via computers, computer networks, or the internet:

Answers

The answer is Cybercrime.  The theft and/or destruction of information, resources, or funds via computers, computer networks, or the internet is called Cybercrime.  Common types of cybercrime involve hacking, online scams and fraud, identity theft, etc.

A data ________ is the structure and organization of data which involves fields records and files

Answers

Data hierarchy is the structure and organization of data which involve files and field records.

You find that your mobile device won't load any apps. identify the choice that is not a likely cause.

Answers

You may have used all your data for the month. is the answer
you have used up all your data of the month 

What is an online alternative to customers sending checks via mail?

currency exchange

Western Union

payment processor

Moneygram

Answers

An online alternative to customers sending checks through e-mail is: C. payment processor.

What is online banking?

Online banking can be defined as a type of technology that financial institutions use to offer its customers an opportunity to receive and send money through the Internet.

Some examples of online banking institutions include the following:

Western UnionPay-PalMoneygramPayment processor

Payment processor is an alternative online banking institution that enable customers to send checks through e-mail.

Read more on online banking here: https://brainly.com/question/2772610

The ____ aggregate function finds the largest value

Answers

The MAX aggregate function.

MAX aggregate function returns the maximum value of an expression over a group of rows. It can be used as an analytic or an aggregate function. Aggregate function MAX can operate with Boolean values or can be converted to a Boolean.



An example of software most commonly associated with productivity software is ____.

Answers

Hello User

Answer: An example of software most commonly associated with productivity software is word processing software

Word processing software is a program used to manipulate a text document. 

Hope This Helps
-Chris

______ is a slow process that takes place in nature. (2 points)

Budding

Reproduction

Migration

Natural selection

Answers


Natural Selection.


♣Amaranthine

A(n) _________ uses the same software and service structure as the internet, but it contains only the company's private information such as documents managed by microsoft sharepoint.

Answers

An intarnet uses the same software and service structure as the internet, but it contains only the company's private information such as documents managed by Microsoft SharePoint.
The term intranet denotes is a private internet that is used exclusively within an organization and it is accessible only to an organization's staff. 

The ipv6 address, 2001:0000:0000:3210:0800:200c:00cf:1234, can be shortened to __________.

Answers

The answer is : 2001::3210:800:200C:CF:1234   You can drop leading zeroes. 00CF becomes CF and You can remove one or more "hextets" of zeroes and replace with double colons (::).

The most commonly used video formats are the mpeg-____ format, the windows media audio/video format, and the audio visual interleave format.

Answers

The answer is mpeg-4.  The most commonly used video formats are the mpeg-4 format, the windows media audio/video format, and the audio visual interleave format.

What is the program that searches through data bases?

Answers

if i'm right its call: Algorithm

TRUE/FALSE: In order to use an object in a program, its class must be defined.

Answers

Yes that is correct. True

"which key do you hold down to select a group of contiguous files"

Answers

The "Ctrl" key is the answer.

You already created a line chart, but now decide that you want to change this chart to a pie chart. to do this, you click ____ from the type group in the chart tools design tab. change chart type alter existing chart modify chart new chart

Answers

Click change Chart Type from the type group in the chart tool design tab.

What is a primitive?
A. A simple 2-D object such as a rectangle or circle
B. A simple 3-D object such as a cube, cylinder, or sphere
C. A rectangle
D. A sphere

Answers

Its A.  this one is so easy for me ;)  

What are two ways to accept data typed into a cell? pressing the Backspace key or clicking the scroll arrows pressing the Tab key or pressing the Backspace key clicking the scroll arrows or pressing the Enter key pressing the Tab key or pressing the Enter key

Answers

If the data is text, simply press enter after typing data into cell.

If the data typed is numeric, but need to be considered text, add ( ' ) on the leftmost or start of the entry.

If the data typed is a formula, add equal to leftmost or at the start of the entry.


Answer:Press the Tab key.

Explanation: right on edge22

WILL GIVE BRAINLIST IF ANSWERED RIGHT 1. An engine's _______ contains the cylinder block, the cylinders, the piston, the connecting rods, and the crankshaft assemblies. A. upper end B. lower end C. back end D. bottom end Student Answer: A Answer: Incorrect Reference: Section 2.1 2. Compression gases that get past the rings and into the engine crankcase are called A. compression gases. B. blow-by gases. C. gas leaks. D. intake gases. Student Answer: C Answer: Incorrect Reference: Section 2.2 5. Technician A says that the burning of the air-and-fuel mixture in the cylinder is called fuel activation. Technician B says that the basic function of the upper-end components is to control the flow of air-and-fuel mixture into the engine and the flow of exhaust gases out of the engine after combustion. Who is right? A. Both Technicians A and B B. Neither Technician A nor B C. Technician A only D. Technician B only Student Answer: A Answer: Incorrect Reference: Section 2.1 11. What is shown in the above figure? A. Compression ring 2 B. Cam-ground piston C. Compression ring 1 D. Oil control ring Student Answer: B Answer: Incorrect Reference: Section 2.2 17. What does the above figure represent? A. Cam-ground piston B. Piston offset C. Stroke D. Bore Student Answer: B Answer: Incorrect Reference: Section 2.2 19. Technician A says that the piston's most important function is to transfer the force produced by the burning air-and-fuel mixture into usable power. Technician B says that the piston size is used to help form a seal between the piston and the cylinder walls. Who is right? A. Both Technicians A and B B. Technician B only C. Technician A only D. Neither Technician A nor B Student Answer: A Answer: Incorrect Reference: Section 2.2 20. Which of these is the distance from the head of the piston (not including any dishes or domes) to the deck surface of the engine block? A. Piston Deck Clearance B. Rod Length C. Piston Compression Height D. Compression Ratio Student Answer: C Answer: Incorrect Reference: Section 2.2

Answers

first three are c b and d

What is shown in the above figure? A. Compression ring 2 B. Cam-ground piston C. Compression ring 1 D. Oil control ring

The correct answer D. Oil control ring

A Web _________ is an Internet-based computer that stores Web site content and accepts requests from browsers.

Answers

The answer is server.

What functionality can a vulnerability scanner provide that a port scanner cannot?

Answers

Sending alerts when new systems are added to the network is the functionality that a vulnerability scanner can provide and a port scanner cannot.
port scanner allows testing of open ports and firewalls. It discovers open UDP ports on your target system by scanning with NMAP and by doing so it is the first step of a complete vulnerability assessment. 

Vulnerability scanners offer broader functionality than port scanners by identifying and testing for specific vulnerabilities and providing remediation recommendations, whereas port scanners only identify open or closed ports.

Both vulnerability scanners and port scanners are critical tools used in cybersecurity, but they serve different purposes.

Port Scanner

A port scanner, like NMAP, is used to identify open ports on a network. This helps in understanding the services and applications running on different systems within the network. However, its functionality is limited to scanning and reporting on open or closed ports, without providing in-depth insight into the potential vulnerabilities of the system.

Vulnerability Scanner

In contrast, a vulnerability scanner, such as Nessus or OpenVAS, goes a step further by not only identifying open ports but also actively testing the system for potential vulnerabilities. These scanners check for misconfigurations, missing patches, and security flaws that could be exploited by attackers.For example, while a port scanner may report that port 80 is open, a vulnerability scanner would analyze the web application running on that port to ensure it is not susceptible to known threats like SQL injection or cross-site scripting (XSS). Additionally, vulnerability scanners often provide detailed reports and recommendations for remediation, which port scanners do not.

The idea of supply and demand is based on the development of

business decisions in a thriving economy.
sufficient products to meet consumer wants.
governmental laws that regulate the economy.
business efforts to improve product appeal to consumers.

Answers

Answer:

The idea of supply and demand is based on the development of sufficient products to meet consumer wants.

Explanation:

In economic theory supply and demand explains the relation between price ,sellers and buyers of a resource.

If the demand increases and supply increases it dose not have any affect on price.

If demand increase and supply decrease it triggers an increase in price

If demand decrease and supply increase it triggers decrease in price.

Answer:

Business efforts to improve product appeal to consumers.

Explanation:

The idea of supply and demand is based on the development of business efforts to improve product appeal to consumers.In an economy, innovation plays big role. Things people didn't even know they needed exist and are now an important part of their lives.

Supply and demand is created because of the businesses efforts to create a need among the consumers and supply to fulfill those needs.

Which chart tools ribbon tab enables a user to apply a style to the selected chart?

Answers

Design is the chart tools ribbon tab that enable the user to apply a style to the chart selected.

You want to be able to access your home computer using remote desktop while traveling. you enable remote desktop, but you find that you cannot access your computer outside of your home network. what should you do?

Answers

Get a program for this perpose or perhaps get a new computer
hey 

get a app that well let u do it

ohn would like to move from the suburbs into the city, but the rent in the city is very high. John has found an apartment he really likes, but he can only afford about 60% of the monthly rent. What is the best housing option for John?

Answers

Ohn should find a roommate to split the rent.

if nothings faster than light then how do the dark get there first????

Answers

Darkness only happens because of the lack of light. For instance, when it's nighttime the only reason it's dark is because there is not enough light to create, well, light.

A cracked tone ring will often cause what type of problem?

Answers

A cracked tone ring will often cause, False ABS actuation at low speed.

The eiffel tower was made using this type of construction

Answers

The Eiffel Tower was created using Iron and a Latticework Construction. The Eiffel tower  is a wrought iron lattice tower on the Champ de Mars in Paris, France. It is named after the engineer Gustave Eiffel, whose company designed and built the tower.  The latticework construction supports its own weight. The strips of metal are crisscrossed as the tower is built, supporting itself as it goes up. 

Which group on the formulas ribbon contains a command that allows a user to create names for cells to use in a formula?

Answers

Defined Names is the group on the formulas ribbon that contains a command that allows a user to create names for cells to use in a formula.

A _______ is a list of instructions for the computer to follow to accomplish the task of processing data into information. systems design word processor program systems analysis

Answers

A program is a list of instructions for the computer to follow to accomplish the task of processing data into information. This specific set of ordered operations performs a specific task when executed by a computer.
Each program is written with some programming language, which  uses symbols, words, and phrases to instruct a computer to perform specific operations.

What information would you find in the header of a transport layer pdu?

Answers

Window size is the information that you can find in the header of layer pdu transport.

The program used to create the file where you want to insert the object is called the ____.

Answers

It is called the OLE
Other Questions
In the presidential election of 1796, which political party did john adams represent Which of the following is NOT a symptom of diabetes? A. increased thirst B. blurred vision C. loss of appetite D. recurring infections Please select the best answer from the choices provided. The _______ is moving end of muscle whose tendon attaches to a bone Suppose a term of a geometric sequence is a4 = 121.5 and the common ratio is 3. write the formula for this sequence in the form an = a1 rn1. explain how you arrived at your answer. The woolly mammoth, an ancestor of the modern-day elephant, thrived millions of years ago. (1) When it first appeared, the world was very different than it is today. Much of the land was frozen, which is why the mammoth needed its thick, warm coat of shaggy hair. (2) Despite the cold, there was a great deal of vegetation, which the huge animals ate abundantly. Mammoths were well suited for their environment. Their population thrived in many of the coldest places of the world, such as Alaska and Siberia. Around 10,000 years ago, however, something changed dramatically. (3) Mammoths began to quickly disappear. Today, scientists are unsure of the exact cause of this. "Some speculate the climate began to change quickly, interfering with the mammoths' lifestyles and food supply," noted Dr. Yuri Fedorsky, a Russian archeologist. "Others think a terrible disease might have swept across the population. Still others point to the idea that people hunted the animals to extinction." Some mammoths lived on isolated islands until about 4,000 years ago; however, they are all extinct today. (4)Elephants, their closest ancestor, tend to live in warmer climates because they lack the thick fur of the mammoths. Which sentence is not relevant to the paragraph and should be deleted? A) Sentence 1 B) Sentence 2 C) Sentence 3 D) Sentence 4 Uppose it costs $10 to roll a pair of dice. you get paid the sum of the numbers in dollars that appear on the dice. what is the expected value of this game? what is the maximum for f(x)= 625-16x^2 Lesson 6.04 in this lesson you will: 1.write the introdcution paragraph for your argument using the same topic you chose and researched in lesson 6.02. What is the diagnosis? for several months, rachel had been agitated. she spent money way too freely, felt very energetic, and very creative. then, she sank into a deep depression, not wanting to complete tasks and feeling worthless. rachel's specific diagnosis is called and falls under the category of? Which expression is equivalent to 18x + 45 Those faced with caring for their children and parents are ____ happy as those who are not. a proton is moving horizontally at 7.9 x 10^5 m/s. It passes through a vertical magnetic field that points downward. In which direction is the proton deflected by the magnetic field? A. up B. to the right of its velocity C. down D. to the left of its velocity ________________ structure controls the physical properties of elements. Nucleus Electron A. NucleusB. Electron __________ percent of violent criminals are arrested again less than three years after they get out of prison. Kris wanted to understand whether students at her school were in favor of an extended school day. She surveyed some students and displayed the results in the table below: In favor Opposed Undecided Grade 9 6 4 8 Grade 10 10 11 9 Grade 11 12 15 11 Grade 12 15 6 14 If the principal randomly selects a student in grade 10 from this survey, what is the probability that the student is opposed to extending the school day? (1 point) Question 9 options: 1) 0.09 2) 0.29 3) 0.30 4) 0.37 Estimate x- and y- intercepts of the graph On the trip you and your friends stop for gas and decide to drinks 1.05, and snacks, which are 2.20, if they spend a maximum of 25$ and wish to buy at least 12 items , write a system of inequalities that show the range of drinks and snacks you can buy with 25.00, 2 inequalities are needed, and a data table for each What toxin does staphylococcus aureus release to produce a fever? A circle has a circumference of 324\pi324324, pi. what is the radius of the circle? The _____ is a measure of variability that is simply the difference between the highest score and the lowest score. variance standard deviation median range