Complete Mark 0.50 out of 2.00 Flag question For what kind of systems, you would choose Function-Oriented design and why would you not choose an object- oriented design for such systems? (CLO:3,4) for minimal system state software requirment specification information is typically communicated via parameters or shared memory no temporal aspect to functions of design promotes a top-down functional decomposition style each unit has a clearly defined function I easier to extend in the future and more flixible

Answers

Answer 1

Function-oriented design is selected when a top-down functional decomposition approach is promoted, and each unit has a clearly defined function. It's a design approach that's used to design software systems that solve issues such as optimization, testing, and program correctness.

It emphasizes the functionality of the application. Therefore, it is an ideal alternative for systems that are not object-oriented. Thus, it is not appropriate to use object-oriented design for such systems. Object-oriented design is suitable for systems that are highly dependent on a model, which represents real-world or abstract concepts in terms of data structures and operations that can be done on those structures. Object-oriented programming (OOP) designs are frequently found in domains where model quality is crucial. It is ideal for modeling systems with a large number of entities and complex relationships, such as simulations, games, and computer-aided design (CAD) systems. Therefore, if the application demands object modeling, it is advisable to use object-oriented design. In summary, for minimal system state software requirement specification, function-oriented design is typically employed. The use of shared memory or parameters is common in this design. The temporal aspect of the system's function is not considered. Each unit has a well-defined function, which makes it more adaptable and flexible.

To learn more about functional decomposition, visit:

https://brainly.com/question/31554775

#SPJ11


Related Questions

Which principle or element of layout design is highlighted in this event poster?
i. a headline
ii. a column
iii. a sub-headline
iv. a caption

Answers

The  principle or element of layout design is highlighted in an event poster in option i: The headline.

What are the elements of page layout?

The poster is known to be one that often uses a kind of hierarchy and centered text alignment as its element.

Note that it is one whose Lines of use is said to be made up of different kinds of type styles, sizes and others.

The simple elements of an advertising poster is made up of:

1. The headline.

2. The sub-head.

3. The body copy.

4. The caption.

The elements of page layout are visual hierarchy, visual flow, and others. Hence, the  principle or element of layout design is highlighted in an event poster in option i: The headline.

Learn more about layout design from

https://brainly.com/question/2501083

#SPJ1

What is an easy and accurate way that a graphic designer can increase the size of a digital shape while keeping the ratio of height to width the same?
First make the height taller, and then drag the width by using one’s eyes to try to make sure the proportions stay the same.
Hold the key, such as Shift, that the program uses to make sure all dimensions are adjusted while dragging just one side.
Open the shape’s properties window, and type the height value multiplied by 2 and the width value multiplied by 3.
First convert the shape into a photo file, and then digitally manipulate it in a program such as Adobe Photoshop.

Answers

Answer:

Open the shape’s properties window, and type the height value multiplied by 2 and the width value multiplied by 3.

Explanation:

Answer: A resolution independent, vector graphics and illustration application used to create logos, icons, drawings, typography and complex illustrations for any medium.

explanation:

because it is what it is

A student collected data for a science fair project. The student has many data values for six subjects .which type of software would be most helpful to this student to analyze the data?

Answers

For this student to study the data, relational database software will be of greatest use.

Which of the following applications would benefit more from computational image analysis over picture metadata?To evaluate the relative appeal of pictures of scenery, people, and things.Office 365 and Microsoft 365's Microsoft Teams are the focal points for team collaboration. Teams of employees may connect and work together more easily because to the platform's many capabilities.Scientific researchers are more susceptible to being informed by false and misleading data.For this student to study the data, relational database software will be of greatest use.Scientific researchers are more susceptible to being informed by false and misleading data.          

To learn more about software refer to:

https://brainly.com/question/28224061

#SPJ4

How does malware spread

Answers

Answer: Malware can use known software vulnerabilities to infect your PC. A vulnerability is like a hole in your software that can give malware access to your PC. When you go to a website, it can try to use vulnerabilities in your web browser to infect your PC with malware. Other than this malware can spread by four ways Clicking on links to malicious websites in emails, messaging apps or social network posts. Visiting compromised websites, aka drive-by downloads, viruses can be hidden in HTML, thus downloading when the webpage loads in your browser. Connecting your device to infected external hard drives or network drives

Answer: Malware is usually distributed through malicious websites, emails, and software. Malware can also be hidden in other files, such as image or document files, or even in seemingly innocuous files, such as.exe files

what is the shortcut key that repeats the last task?

Answers

Answer:

Cntrl+Y

Explanation:

((GUITAR))
What is the letter name for the note shown above?

D
E
F
G

((GUITAR))What is the letter name for the note shown above? D E F G

Answers

It is Letter G
Explanation: Took Guitar classes as a kid and memorized the letters.

Sasha's new company has told her that she will be required to move at her own expense in two years. What should she consider before making her decision?

Answers

To make her decision, Sasha should consider cost of living, job market, quality of life, social network, and career advancement before moving for her new job.


What is the rationale for the above response?  

Before deciding whether or not to move for her new job, Sasha should consider several key factors.

Firstly, she should research the cost of living in the area where she will be moving to, as well as job opportunities, salaries and stability of the job market. Secondly, she should consider the overall quality of life, including climate, recreational opportunities and community atmosphere.

Note as well that, Sasha should consider her current social network and the opportunity to build a new one in the area where she will be moving to. Finally, she should weigh the potential benefits and costs of the move in terms of her personal and professional goals to determine if it is the right decision for her.

Learn more about Decision Making at:

https://brainly.com/question/13244895

#SPJ1

Which of the following shows the assignment of a string to a variable? Select 3 options.

answer = input("How old are you? ")

answer = "23"

answer = '23'

answer = 23

answer = (23)

Answers

Answer:

23, (23)

Explanation:

Answer:

⬇️

Explanation:

answer = "23"

answer = input("How old are you? ")

answer = '23'

correct on edg. 2021

consider the following three class declarations classone classtwo classthree

Answers

The correct answer is Based on the information provided, it seems like you are requesting an analysis or further information on three class declarations:

ClassOne, ClassTwo, and ClassThree. However, it seems that the class declarations themselves have not been provided.To provide you with accurate information or analysis, please provide the details or code for the class declarations ClassOne, ClassTwo, and ClassThree. This way, I can assist you with any questions or provide insights into the specific class implementations.

To know more about information click the link below:

brainly.com/question/30539400

#SPJ11

what is the one statement that can be used to insert a new node at the head of a linked list. assume that the list's head pointer is called head ptr and the that the data for the new node is called entry.

Answers

The one statement that can be used to insert a new node at the head of a linked list is as follows: `head_ptr = new_node;`

A linked list is a dynamic data structure that consists of a series of nodes, each of which contains a reference to an object and a pointer that refers to the next node in the list. A linked list is made up of nodes that are not stored in adjacent memory locations. Instead, each node points to the next node in the list. The first node in the list is referred to as the head, while the final node in the list is referred to as the tail. The tail node has a null reference pointer.

A node in a linked list is a data structure that contains the element stored as well as a reference pointer to the next node. Every node in a linked list is connected to the next node in the list by a pointer. A node is made up of two parts: a data part, which stores the actual data, and a pointer part, which stores the memory address of the next node. When a node is deleted, the pointer to that node in the previous node is set to null.

A head pointer is a pointer that points to the first element in a linked list. The head pointer allows you to add new nodes to the beginning of the list and traverse the entire list starting from the beginning. The head pointer is kept track of by the program in order to add, delete, and manipulate nodes in a linked list.

A tail pointer is a pointer that points to the last node in a linked list. It can be utilized to add nodes to the end of the linked list or to speed up linked list traversal by storing a reference to the tail node. The tail pointer is kept track of by the program in order to add, delete, and manipulate nodes in a linked list.

You can learn more about the linked list at: brainly.com/question/29360466

#SPJ11

9
10
1
2
3
4
5
Which is a valid velocity reading for an object?
45 m/s
45 m/s north
O m/s south
0 m/s

Answers

Answer:

Maybe 45 m/s north I think I'm wrong

Answer:45 ms north

Explanation:

Give three examples of the following types of data?
Give three examples for each category in the software domain ?

CCDI :)??

Give three examples of the following types of data?Give three examples for each category in the software
Give three examples of the following types of data?Give three examples for each category in the software

Answers

An example of transactional data are:

Sales ordersPurchase ordersShipping documents

Its software domain are: Personal  meeting, a telephone call, and a Video call

An example of  financial data are: assets, liabilities, and equity. The software are: CORE Banking, Retail Banking, and Private banking

An example of intellectual property data are: books, music, inventions. The software domain are Patents, trademarks, and copyrights

What types of software are used in the financial industry?

Through sales and marketing tools, data-driven contact management, and workflow automation, customer relationship management (CRM) software assists financial services organizations in fostering new relationships and maximizing the value of existing customers.

You can see how your consumers are utilizing your website to complete a transaction by using transaction management software. It may demonstrate both how each website element functions on its own and as a part of the overall technological infrastructure.

Note that Information that is gathered from transactions is referred to as transactional data. It keeps track of the date and location of the transaction, the time it took place, the price ranges of the goods purchased, the mode of payment used, any discounts applied, and other quantities and characteristics related to the transaction.

Learn more about transactional data  from

https://brainly.com/question/28081430
#SPJ1

HELPP PLEASE
Which statement about a state machine is always accurate?
Responses

It has finite states.

It has three or more states.

It has two or more states.

It has three states.

Answers

Answer:

it has finite states

Explanation:

A state machine is a mathematical model that describes the behavior of a system as it changes between a finite number of states in response to a set of inputs or events. It always has a finite number of states, which means that it cannot have infinite states. It can have two or more states, but it's not necessary to have three or more states, and it's not necessary to have exactly three states.

what happens if you have the power of on of the nine and you take another where does the old power go attack on tiatn

Answers

If a person with the power of one of the Nine Titans takes on a new Titan power, the old power is not lost, but is instead passed on to a new host.

The process of passing the power on is known as the "Coordinate," and it is one of the Founding Titan's special abilities. The Coordinate allows the power to be passed on to new hosts, either willingly or unwillingly, ensuring that it will not be lost.

However, the Coordinate also has the potential to be used for destruction, as it can be used to pass the powers of the Nine Titans on to those who are not of the Eldian people, potentially allowing Marley to gain access to them.

Learn more about Titan power:

https://brainly.com/question/1012253

#SPJ4

what do you think are the IPO components in an online movie ticket booking system?

Pls answer correctly ASAP​

Answers

Explanation:

Online Movie Ticket Booking System is a website to provide the customers facility to book tickets for a movie online and to gather information about the movies and theaters. Customer needs to register at the site to book tickets to the movie

Advantages of Online Booking Systems

Your business is open around the clock. ...

You can maximize reservations. ...

You get paid quicker. ...

You're not tied to a phone. ...

You can effortlessly up-sell add-ons. ...

It's easy to manage your calendar. ...

You get valuable insight about your business

What is the difference between a displayed result and a formula?
The displayed result is always the same number, but the formula changes.
The formula is always the same as the displayed result, it will always be a simple value.
The displayed result changes as the formula dictates it; it may not be a simple value.
The displayed result and the formula are unrelated.

Answers

Answer:

The displayed result changes as the formula dictates it; it may not be a simple value.

Explanation:

Answer:

The displayed result changes as the formula dictates it; it may not be a simple value.

Explanation:

what are the different forms of auto form?​

Answers

Answer:

There are two types of AutoForm—the New Object: AutoForm and the builder-based AutoForm. The New Object: AutoForm generates a very simple and uninspiring data entry form. The builder-based AutoForm creates five different types of forms: Columnar, Tabular, Datasheet, PivotTable, and PivotChart.

Common methods of securing an IT system do NOT include

A) protecting system integrity by using antimalware programs

B) protecting data integrity by unblocking unauthorized access

C) protecting data integrity by creating backups, entering and editing data correctly

D) setting permissions to restrict access

Answers

Common methods of securing an IT system do not include B) protecting data integrity by unblocking unauthorized access.

What purposes do IT systems serve?

An information technology system (IT system) is typically an information system, a communications system, or, more specifically, a computer system, that has about all peripheral devices, software, as well as hardware, that is used by a little number of IT users.

They include:

Make a backup of your data.Use secure passwords.When working remotely, use caution.Install malware and antivirus protection.

Note that it does not include option B because that cannot guarantee system security.

Learn more about IT system from

https://brainly.com/question/25720881
#SPJ1

Why does my phone keep shutting off and restarting?

Answers

Answer:

If you rooted it, it might be because the action bricked the phone somewhat. There's also a possibility that some hardware component is faulty.

describe the vulnerability and discuss the likelihood of the vulnerability being exploited involved in accessing a website with an unsigned public key

Answers

Users should exercise caution when accessing websites with unsigned public keys and verify the authenticity of the website and its SSL/TLS certificate before entering any sensitive information.

Accessing a website with an unsigned public key can expose the user to a security vulnerability, as it makes it easier for attackers to intercept and manipulate the communication between the user and the website. A public key is a crucial component of the SSL/TLS encryption protocol that is used to establish secure connections between users and websites. When a website uses an unsigned public key, it means that the authenticity of the public key has not been verified by a trusted third party, such as a certificate authority.

The vulnerability arises because an attacker can intercept the user's connection request and replace the website's unsigned public key with a fake public key that they control. This allows the attacker to establish a man-in-the-middle attack, where they can intercept and manipulate the communication between the user and the website. This can enable the attacker to steal sensitive information, such as login credentials, credit card details, or personal information, or to install malware on the user's device.

The likelihood of the vulnerability being exploited depends on various factors, such as the sophistication of the attacker, the sensitivity of the information being transmitted, and the value of the target. While the use of unsigned public keys is relatively rare, it can still pose a significant risk to users who access such websites. It is essential for website owners to ensure that their public keys are signed by a trusted certificate authority and that they use up-to-date SSL/TLS encryption protocols to establish secure connections with their users.

Learn more about Users here

https://brainly.com/question/27960093

#SPJ11

What Is Better, A GTX 1660 Or Radeon Rx 5500XT

Answers

Answer:

I say Radeon Rx 5500XT

Explanation:

: For unit testing and integration testing, which one is incorrect? A. Functional testing is a white box approach. B. Functional testing covers specification better than structural testing. C. Black box approaches do not look into code. D. Structural testing covers code better than functional testing. E. None of the above

Answers

White box methodology refers to functional testing. Whereas integration testing is a type of black-box testing, unit testing is a type of white box testing.

When written code is tested during unit testing, access to the source code is necessary; however, since integration testing examines the relationships and interfaces between modules, access to the source code is not necessary. Whereas integration testing is a type of black-box testing, unit testing is a type of white box testing. When written code is tested during unit testing, access to the source code is necessary; however, since integration testing examines the relationships and interfaces between modules, access to the source code is not necessary. The importance and value of the unit test and integration test are both enormous.

Learn more about functional here:

https://brainly.com/question/5975436

#SPJ4

Match each role to the corresponding web development task.

Match each role to the corresponding web development task.

Answers

Answer:

1. Art director: selecting color palettes.

2. Web project manager: creating budget spreadsheets.

3. Usability lead: researching target audiences.

4. Developer: coding.

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations of a web page to be displayed.

The various role performed during the web development process (task) includes;

1. Art director: selecting color palettes. This individual is saddled with the responsibility of choosing the color that best fits a website.

2. Web project manager: creating budget spreadsheets. He or she is responsible for performing tasks such as creating a financial (budget) plan, start and finish date (timing), procurement, etc.

3. Usability lead: researching target audiences. This individual is saddled with the responsibility of surveying and collecting data from the demography for which the website is designed.

4. Developer: coding. This is the technical expert referred to as a web developer and is responsible for writing the set of instructions (codes) that enables the website to work properly and serve a purpose.

Which of these is NOT a way that technology can solve problems?
Group of answer choices

sorting quickly through data

storing data so that it is easily accessible

making value judgments

automating repetitive tasks

Answers

Answer:

making value judgements

Explanation:

honestly this is just a guess if there is any others pick that but this is just what I'm thinking

solve the following equations and check your result 1) 3x=2x+18​

Answers

Answer:

x = 18

Explanation:

3x = 2x+18

3x-2x = 18

x=18

Answer:

Explanation:

3X-2X=2X-2X+18

X=18

Please Help!

Choose all items that are characteristics of placing nested elements on a new line, using indentation.


A) makes HTML errors difficult to find

B) not required by a web browser

C) can cause web page display errors

D) makes HTML analysis and repair easier

E) done automatically by HTML authoring software

Answers

Answer:

Its B,D,E

Explanation:

Got it right on e2020

Answer:

B). not required by a web browser

D). makes HTML analysis and repair easier

E). done automatically by HTML authoring software

Btw cause this class can be a pain here are the answers to the rest of the assignment.

Slide 7/12:

The missing element is

C). <p></p>

Slide 9/12:

The missing tag is:

B). an end (closing) a tag

Slide 12/12:

The missing character is

D). an angle bracket

Explanation:

I just did the Part 3 on EDGE2022 and it's 200% correct!

Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)

arrays are usually passed by reference when calling subroutines. true/false

Answers

The statement "Arrays are usually passed by reference when calling subroutines" is true.

The passed parameters are classified into two types: reference parameters and value parameters. The original data's memory address is passed to the called function when the reference parameters are passed to the subroutine.

Thus, the original variable is modified by the subroutine as well. This is why reference parameters are sometimes known as "pass-by-reference" parameters .Arrays in general are passed by reference when calling subroutines.

The reason for this is that when you pass an array to a subroutine, the function operates on the original array instead of creating a copy of it. This reduces the time it takes to pass the array to the subroutine.

Know more about the Arrays

https://brainly.com/question/19634243

#SPJ11

What are 3 similarities and 3 differences between live theatre and film/videos -Drama Class

Answers

Differences-
1. Theatre is live. Film has been captured in the past. We only see after the making process is done.

2.You have chance for improvement in each theatre shows but its impossible in Films. Once film is done its done.

3.Normally Theatre is cheaper, films are costly.

Similarities-

1.Theatre and films both are arts, so many varieties of arts melt into theatre or film to make it happen.

2.Theatre and films both are very effective medium of communication.

3.Theatre and films both are considered as great form of Entertainment.

How to fix "your account was flagged for potential abuse. if you feel this is an error, please contact us at help.openai.com"?

Answers

Answer:

If you received a message saying "your account was flagged for potential abuse. if you feel this is an error, please contact us at help.openai.com," it means that OpenAI's automated systems detected some activity on your account that may have violated their terms of service or community guidelines. This could be due to a number of reasons, such as spamming, using bots or scripts, or engaging in other types of abusive behavior.

To fix this issue, you should immediately contact OpenAI's customer support team by visiting help.openai.com and submitting a request. In your request, explain the situation and provide any relevant information that may help them resolve the issue. Be sure to include your account details and any evidence that supports your claim that the flagging was an error.

It is important to note that OpenAI takes abuse very seriously and has strict policies in place to protect their users and community. If you are found to have engaged in abusive behavior, your account may be suspended or terminated permanently.

In order to avoid future issues with account flagging or suspension, it is important to familiarize yourself with OpenAI's terms of service and community guidelines, and to always use their platform in a responsible and ethical manner.

explore the data. how many passengers are included in the dataset? how many of them survived and how many of them did not survive? please explain how you obtain the answers.

Answers

Number of passengers who survived: 342
Number of passengers who did not survive: 549

To explore the data and find out how many passengers are included in the dataset and how many of them survived or did not survive, we first need to load the dataset and analyze it.
Assuming that the dataset being referred to is the Titanic dataset, we can load it using Python's pandas library:
import pandas as pd
titanic_data = pd.read_csv('titanic.csv')
Now that we have loaded the dataset, we can use the `shape` attribute to find out the number of rows and columns in the dataset:
print("Number of passengers in the dataset:", titanic_data.shape[0])
This will output the number of rows in the dataset, which corresponds to the number of passengers in the dataset. For the Titanic dataset, this should be 891.

To know more about passengers visit :-

https://brainly.com/question/19092937
#SPJ11


Other Questions
does changing the length significantly change the period of the pendulum? explain. At 1 atmosphere and 20 degrees Celsius, all samples of H20(l) must have the sameA)volume B) mass C) density D) weight(Explain) compare, using subtraction and division, the amount of sugar used in two recipes, if Recipe 1 used two and two thirds (2 2/3) cups and Recipe 2 used one and a half (1 1/2) cups. Show your calculations and then write your answers as sentences. Please help me with labeling these!!!! how will you convert the masses of anhydrous MgSO4 and water to moles what were the new technologies introduced in world war I It is important for the salesperson to pay close attention to the buyer's interests during the need discovery phase to: f(x, y) = x^2/2 + 7y^2 + 6y^2 3x have a global maximum and global minimum? If it does, identify the value of the maximum and minimum. If it does not, be sure that you are able to explain why. Global max does anyone know what the value of x is Which of the following characters indicates that a Windows network share is intended for administrative access FUR THE WORLD SAY AND TO 4142-414=? HELPPPPPPPPPPPPP can you help me with my work WILL MARK YOU BRAINLEST FOR WHOEVER ANSWERS CORRECTLY.PLEASE HELP ME:Richards Rental Car charges a $55 rental fee and $0.25 per mile. Fidels Rental Car charges $45 rental fee and $0.35 per mile. How many miles would you have to drive for it to cost the same to rent from either car company? How did the Nazi party capitalize on severe economic depressionand widespread unemployment? A 3ft square footing carries a sustained load of 10kips. The footing is placed on the surface of a 30ft thick clay underlain by dense sand. Groundwater is also at the ground surface. Based on the laboratory tests, the clay can be adequately modeled using the e-log-p method and has the following properties: Unit Weight, =123lb/ft3 ,Cc/1+eo=0.06,Cs/1+eo=0.02,c=900 psf Compute the primary consolidation settlement of the footing. Assume 1) Stress only extends to 2 B,3 ) one layer in your settlement analysis, and 3 ) use the 2:1 approximate method to determine stress increase tell me what dogs for 2 weeks the first week she earned $5.75 the second week she earn $12.50 how much money did TV earn the second week then the first week What state of matter has particles that are close together but can slide past one another. what is the purpose of filling a clean centrifuge tube with deionized water and placing it in the centrifuge directly across from your single sample of precipitate? What is the value of n in this equation?2n + 1.6 = 17.6 Subject: Project Evaluation1 Write Short notes on the following: a) The NPV as the preferred method of choice for evaluation of [6 marks] project cash flows b) Environmental Resources as Public Goods [8 marks] c) Efficiency Cos