HURRY PLS
polina is a system architect and at the point in her current project where she must review the code at a high level to make sure it meets all the requirements. After that, which of the following groups will polina work with


A) the testing team

b)the CEO

Answers

Answer 1

Answer:

the testing team

Explanation:

because even though she may have fulfilled the requirements but she still need to test if it runs perfectly or not


Related Questions

in the tcp/ip protocol that allows communication across the internet, what does tcp do?

Answers

TCP tells or state how applications can make channels of communication across a network.

What is the role of TCP?

TCP is known to often help in the management of how a message is put together into smaller packets before they are sent or transmitted over the internet and then put together again in the right way at the arriving or destination address.

Therefore, TCP tells or state how applications can make channels of communication across a network.

Learn more about TCP from

https://brainly.com/question/17387945

#SPJ11

Answer:

The TCP establishes a connection and a secure transmission between the client and the server.

Explanation:

It is designed to break things down as packets, then send it to the server as a request. The server will receive the request nd give you a response, initiating a connection between said services.

Hope this helps!

PLEASE HURRY.

explain the use of various debugging and testing methods to ensure program correctness

Answers

Answer:

Testing and Debugging are huge activities during software development and maintenance. Testing tries to find the problem while Debugging tries to solve the problem. Only after the testing team reports the defect, debugging can take place.

Explanation:

What are backup storage devices of computer? Why are they necessary in the computer system?​

Answers

Answer:

Backup storage devices retains current copies of data on hand, enabling backup in the event of hardware failure or data loss. Backup storage, unlike long-term, archive, or cold storage, must allow for the quick recovery and restoration of backup data. Backup storage devices are disk-based hardware appliances that include specialized software for encryption, interconnection, data processing, and compression. A remote backup appliance aids in the maintenance and recovery of company operations. As storage media, backup storage frequently employs both disk-to-disk (d2d) and magnetic tape systems.

The primary function of such devices is data storage and processing, which serve to improve efficiency and performance. This component comprises hard disks, USB drives, solid-state drives, and portable hard drives. There are additional storage options, such as cloud storage, AWS storage, and so on, but they are not the principal sources of storage devices. These are some of the new ways to save data online. Storage devices are an essential component of a computer system.

What's a common mistake that young people in relationships make?

A. They use shortened words, making text messages difficult to understand.

B. They overshare personal information.

C. They share pictures when they should be texting instead.

D. They don't exchange their passwords soon enough.

(From Digital Technology: Ethics & Literacy)

Answers

B, i say b because oversharing something personal could result in somebody you thought you loved going back telling someone else, causing rumors to be spread out

Couples most frequently commit the errors of not actively listening to one another, taking their spouse for granted, and ignoring issues because they don't want to start a fight.Thus, option B is correct.

What common mistake that young people in relationships?

The failure to set boundaries in relationships was undoubtedly the biggest and most common problem I saw. If we don't treat one another how we would like to be treated, they won't comprehend. Setting limits is essential to preserving peace and demonstrating respect in a partnership.

It may seem apparent, but when you and another person experience the ups and downs of life together, there will inevitably be times when your respect for one another varies. Sometimes things turn out better, sometimes bad.

Therefore, They overshare personal information, a common mistake that young people in relationships make.

Learn more about relationships here:

https://brainly.com/question/9780486

#SPJ2

ram is ________ and has no moving parts.

Answers

RAM is Electronic (solid state) and has no moving parts.

What is a RAM in computer?

RAM is known to be an random-access memory as it is said to be a short term memory and it is the place where data is saved as the time the processor requires for it.

Note that RAM is Electronic (solid state) and has no moving parts as it is often inbuilt in a computer system.

Learn more about RAM From

https://brainly.com/question/13196228

#SPJ11

When designing a query in power bi desktop, what is the best datatype to use for column containing currency values?

Answers

In designing a query in power bi desktop, the best datatype to use for column containing currency values is fixed Decimal Number data type.

What is Fixed Decimal Number data type?

Fixed Decimal Number data type is said to be a kind of currency data type where the given location is said to be fixed for giving the decimal.

Note that in the above case, In designing a query in power bi desktop, the best datatype to use for column containing currency values is fixed Decimal Number data type.

Learn more about datatype from

https://brainly.com/question/179886

#SPJ12

Internet transportation exchanges brings together shippers who post __________ and carriers that post __________ in order to arrange shipments. Group of answer choices capacity, capacity loads, loads capacity, loads loads, capacity

Answers

Answer:

Internet transportation exchanges brings together shippers who post LOADS and carriers that post their AVAILABLE CAPACITY in order to arrange shipments. Group of answer choices capacity, capacity loads, loads capacity, loads loads, capacity

What specialized network device is commonly used to load balance traffic across multiple servers in a group?

Answers

A content switch is a specialized network device that's commonly used by network engineers to load balance network traffic across multiple servers in a group.

What is a content switch?

A content switch can be defined as a class of switch which is designed and developed for the programmatic redirection of request traffic of a client from one server, which was initially selected by load balancing to another server selected based on the content of the request or header.

Thus, a content switch is a specialized network device that's commonly used by network engineers to load balance network traffic across multiple servers in a group.

Read more on switches here: https://brainly.com/question/14850209

#SPJ12

which type of virtual machine (vm) takes advantage of unused capacity in data centers at a much lower cost than regular vms of similar sizes?

Answers

The type of virtual machine that takes advantage of unused capacity in data centers at a much lower cost than regular vms of similar sizes is Transient or Spot VMs.

What is a virtual machine?

It should be noted that virtual machine simply means a machine that allows one to run on an operating system in an app window.

In this case, the type of virtual machine that takes advantage of unused capacity in data centers at a much lower cost than regular vms of similar sizes is Transient or Spot VMs.

Learn more about virtual machine on:

brainly.com/question/19743226

SPJ12

The _____ constraint assigns a value to an attribute when a new row is added to a table

Answers

The default constraint gives a value to an attribute when a new row is added to a table.

Is default a kind of constraint?

This is known to be a type of constraint that often apply a value to a column if an INSERT statement does not really give the value for the column.

Therefore, one can say that the default constraint gives a value to an attribute when a new row is added to a table.

Learn more about default constraint from

https://brainly.com/question/19130806

#SPJ12

What dsl variant has a distance limitation of 18,000 ft. between a dsl modem and its dslam?

Answers

The dsl variant that has a distance limitation of 18,000 ft. between a dsl modem and its dslam is known as asymmetric dsl.

What is asymmetric dsl?

It should be noted that the asymmetric dsl (digital subscriber line) is a popular internet access solution for residential locations.

It enables an existing analog telephone to share the line used for data for the transmission voice and data.

Learn more about dsl on:

brainly.com/question/14599737

#SPJ12

15 POINTS FOR THE ANSWERS ASAP
Which type of portfolio would you prefer to have? Why did you pick that portfolio?

Answers

Answer:

Aggressive Portfolio

Explanation:An aggressive portfolio takes on great risks in search of great returns.

The quickbooks online advanced desktop app can be installed on which operating system?.

Answers

Explanation:

For Android products, your device will need to be running Nougat 7.1. 1 or newer.

What are 15 importance of information processing cycle?

Answers

Answer:

mark me as the brainliest

Explanation:Before you can start to learn about the different types of computers that you will come across, you need to understand the basics of how computers work. All computers, whether they are the smartphone in your hand or large, powerful servers, operate on the same five basic principles. These are input, processing, storage, output and communication. Each component of a computer performs one of these functions, but they all work together to make the computer work.

Answer:

Importance of information processing cycle are:

Explanation:

It provides meaningful information.It helps performers identify relevant cues via selective attention.It helps in increasing movement reactions which will lead ultimately to a successful outcome. It help enhance our ability to store more information in the long term memory is practiced.It provides students with more skills. It aims to explain how information is encoded into memory.It is based on the idea that humans do not merely respond to stimuli from the environment.It deals with large sums of data on a daily basis which is processed into information,etc.

Hope it helps!

In the /etc/shadow file, which character in the password field indicates that a standard user account is locked?

Answers

The character in the password field that tells that a standard user account is locked is "!".

What is password field?

This is known to be a kind of security precaution, where a password field is said to save its value as an array of characters, instead of a string.

Note that the exclamation mark In the file, is said to be the character in the password field that tells that a standard user account is locked.

Learn more about  password field from

https://brainly.com/question/17174600

#SPJ12

Participating providers contract to participate in a BCBS plan preferred provider network (PPN), which is a program that requires providers to adhere to __________ care provisions. a. managed b. hospital c. prospective d. retrospective

Answers

The contracts participate in the PPN provided by BSBS in order to form the adhere to managed care provisions. Thus, option A is correct.

What is BSBS?

BSBS stands for Blue Cross and Blue Shield, is an organization in United States that provides hospital coverage and the insurance.

The preferred provider network (PPN) are the health care service providers to the claimants in the case of injury caused by the motorcycle accident.

Thereby, it can be stated that the BCBS providers with the PPN forms to adhere providing managed care provision. Hence, option A is correct.

Learn more about Blue Cross and Blue Shield, here:

https://brainly.com/question/6967361

#SPJ1

The quickbooks online advanced desktop app can be installed on which operating system?.

Answers

The quickbooks online advanced desktop app can be installed on Windows PC: Windows 10 operating system.

What is this about?

The quickbooks online advanced desktop app can be installed on Windows PC: Windows 10 operating system especially Windows 10, and whose specification is Intel Core i5 that has at least 4 GB of RAM.

Note that a person needs Adobe Reader 11.0 or higher to nbe able to print forms or the use of  Mac: OS X "High Sierra" 10.13 or newer.

Learn more about quickbooks  from

https://brainly.com/question/24441347

#SPJ1

Select the correct answer. In the decision-making process, after you have chosen the right solution, what is the next step? A. Act on your decision. B. Reflect on your decision. C. Gather information. D. Identify the problem. Reset Next

Answers

In the decision-making process, after you have chosen the right solution, the next step is to act on your decision.

How do you act on your decision?

A person act on their decision-making by putting those decision taken into use.

Therefore,  In the decision-making process, after you have chosen the right solution,  the next step is to Act on your decision as it entails bringing the decision to light.

Learn more about decision-making from

https://brainly.com/question/3432001

#SPJ1

When verifying sd-wan traffic routing with the cli packet capture tool, which verbosity level should you use?

Answers

The verbosity level that you should use is level 4.

What is a verbosity level?

It should be noted that verbosity level simply means logging in of information on a system.

When verifying sd-wan traffic routing with the cli packet capture tool, the verbosity level that you should use is level 4.

Learn more about verbosity on:

brainly.com/question/76327

#SPJ12

Which is the preferred means of trapping user input for errors?

Answers

Escaping is the preferred method used for trapping user inputs for errors.

HTML (HyperText Markup Language)

Most web pages users interact with today are designed based on the rules of HTML. In a web-based environment, a preferred means developers use to trap user input for errors is the escape string. This typically involves using mysql_real_escape_string() when coding.

You can learn more about escaping here https://brainly.com/question/14821549

#SPJ12

What is the best example of personally identifiable information.

Answers

Answer:

Social Security Number, Drivers License Numbers, Credit Cards.

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.

Answers

Answer:

(config)# service password-encryption

Explanation:

A system administrator could use service password-encryption command to prohibit any specified credentials from showing in text format in configuration files. This command secures all passwords in the config file that have been specified.

To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command.

An administrator can use the service password-encryption command to stop all configured passwords from being displayed in configuration files as plain text. All configured passwords in the configuration file are encrypted by this command.

A password is a group of letters and numbers that is used to confirm a user's identity throughout the authentication process. Passwords are frequently used in conjunction with usernames; they are created to be known only by the user and grant access to a device, application, or website on their behalf. Letters, numbers, and special characters can all be used in passwords, and their length can vary.

Hence, to prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command.

Learn more about the configuration file here:

https://brainly.com/question/32311956.

#SPJ6

Write a class with name shares shares( ) constructor to initialize the object shares(String , int , int ) constructor to initialize the object void buy( ) for buying the shares void sell( ) for selling the shares calc( ) to calculate the total value of shares show( ) to show the details. Note : buy( ) and sell( ) functions will increase or decrease the number of shares, and accordingly the Total value of shares will change. Create another class and write main( ) function and use the above functions....use : string nm(name of buyer)
int no(no. of shares)
int unitprc(price of 1 share)
int totalval (total value of all shares)

Answers

Explanation:

What is constructor?

Constructor is a member function of class, whose name is same as the class.

A constructor is a special type of member function of a class which initializes objects of a class. In C++, Constructor is automatically called when object(instance of class) is created.

Constructor is invoked at the time of object creation. It constructs the values i.e. provides data for the object that is why it is known as constructors.

Constructor does not have a return value, hence they do not have a return type.

Create a chart on basic commands used in HTML.
It should include basic body structure of HTML also.And make it beautiful

Answers

basic HTML commands

1 the head tag

2 titles

3 the body tag

4 headers

5 paragraph

6 performance text

7 bold face and italics

the HTML tag Al truth not currently required by the all clients the HTML tag signals the point where tax should started being interprinted as HTML code

4. Ernesto works in a small office with five other people. What are two possible connection
issues Ernesto might encounter if the company uses a LAN?

Answers

LAN is the networking device and channel that interconnects the local area systems. If the company uses LAN, then issues with speed and connectivity will occur.

What is LAN?

The local area network connects the computers of small and local regions confined to small geographical areas and is seen in the schools, offices, and residences.

If LAN is used between more people then the internet speed and connectivity will be affected as there will be redundancy in the data packet transfer speed.

Therefore, the speed and connectivity will be affected.

Learn more about LAN here:

https://brainly.com/question/14308916

#SPJ1

to link the data from one table to another in an access relational database, a(n) ____ must be common to each table.

Answers

To link the data from one table to another in an access relational database, a field must be common to each table.

Want is database?

It should be noted that database simply means an organized collection of structured information or data stored in a system.

In this case, to link the data from one table to another in an access relational database, a field must be common to each table.

Learn more about database on:

brainly.com/question/26096799

#SPJ12

list of history of generation computer?​

Answers

First-generation — 1940–1956used vacuum tubesENIAC, UNIVAC I, IBM 650, IBM 701, etc.Second generation — 1956-1963used discrete transistorsIBM 7090 and 7094, UNIVAC 1107, PDP-1 and 8, etc.Third generation — 1964-1971used integrated circuits (but not microprocessors)IBM System/360, UNIVAC 1108, PDP-8/I, PDP-11/20 and PDP-11/45, etc.Fourth-generation — 1971-presentuse microprocessorsPDP-11/03 and PDP-11/34, Apple ][, IBM PC, Apple Macintosh, IBM z Series, etc.Fifth-generation — (current research)artificial intelligence and quantum computing

What happens if part of an ftp message is not delivered to the destination?

Answers

The message is lost when an FTP message is not delivered to its destination because FTP doesn't use a reliable delivery method.

What is FTP?

FTP is an abbreviation for file transfer protocol and it can be defined as a type of server that's designed and developed to store and provide files for download, as well as sharing between two or more users on an active computer network.

Generally, the message is lost when an FTP message is not delivered to its destination because FTP doesn't use a reliable delivery method.

Read more on FTP here: https://brainly.com/question/20602197

#SPJ12

What might you expect to find out about people who are described as credit risks?

Answers

What might you expect to find out about people who are described as credit risks? They have a history of not making their payments on time. Which is a long-term consequence of making late payments on your bills? It will be harder to secure a new loan at a low rate.

Convert (765)octal into hexadecimal​

Answers

Answer:

1F5

Explanation:

First convert octal 765 into binary values with each octal digit as a representation using 3 bits

Octal 7 ==> 111

Octal 6 ==> 110

Octal 5 ==> 101

Putting it together we get
111110101

Now group the bit values into groups of 4 (with leading zeros if necessary) starting with the rightmost bit.

Groups are highlighted and then the hex value is written

Right-most group 111110101  and 0101 is 5 hex
Middle group: 111110101  and 1111 is F hex

Left most group: 111110101 ; with leading zeros it is 0001 which is 1 hex

So from left to right we get 1F5

Other Questions
6.11.4 Test(TST): Circles Without Coordinates). The questions are in the document. TRICARE Select options include TRICARE Reserve Select and TRICARE a. Prime Remote b. Dental Program c. For Life Which industry was the first to benefit from the Industrial Revolution? Please help! Will give the brainliest :) Cyclopes have no muster and meeting, no consultation or old tribal ways, but each one dwells in his own mountain cave dealing out rough justice to wife and child, indifferent to what the others do. PROJECT: EXPLORING IDENTITY1. What is your first name, and why did your family choose to give you this name? What meaning does your name have?2. What is your last name? What is the country of origin of your last name? Does your last name mean anything specific?3. What is your ethnic heritage? If you are multi-ethnic, do you follow the customs of one ethnicity more than the others?4. Who is your closest friend and why did you become friends with him or her? In other words, what qualities do you value the most about your closest friend?5. On a scale from 1 to 10, how much stress do you experience in your life?6. What motivates you in school?7. What is something you used to believe but now know to be incorrect?8. What do you do when you need to remember something?9. Who do you think worries more about body image: guys or girls? Why?10. Describe a time when you thought everyone was watching you only to realize that you weren't being singled out.11. If you were to describe yourself in one sentence, what would you say?12. What do you think you will be like as an adult?13. What advice would you give to someone who told you he/she wanted to become a middle or high school teacher? An autoimmune disorder that affects children ages 16 years or younger, with symptoms that include stiffness, pain, joint swelling, skin rash, fever, slowed growth, and fatigue is referred to as . Max is going to order a breakfast platter at The Breakfast Club. He can choose one style of eggs, one type of meat, and one kind of toast. The following table shows the options available to him.Breakfast platterEgg options Fried, Scrambled, Poached, Hard boiledMeat options Bacon, Sausage, Ham, SteakToast options White, Wheat, RyeHow many different breakfast platters could Max create? Can someone help with this pls what are the true statements Internet transportation exchanges brings together shippers who post __________ and carriers that post __________ in order to arrange shipments. Group of answer choices capacity, capacity loads, loads capacity, loads loads, capacity The cost of renewable energies has increased over the last decade A. true B. False If BC is 1 CD is 2 DA is 3 AB is 4,what is EF? Mr. Schultz was still working when he first qualified for medicare. At that time, he had employer group coverage that was creditable. During his initial part d eligibility period, he decided not to enroll because he was satisfied with his drug coverage. It is now a year later and mr. Schultz has lost his employer group coverage within the last two weeks. How would you advise him?. 3 - what = 11please help with this one If f(x) = 3x-2 and g(x) = x+,find f(g(x)).f(g(x)) = [?]Simplify your answer as much as possible. You are given the following information: mass = 48 g; volume=24 cm. What is the density of this substance? how companies themselves are inviting consumers to play a more active role in shaping and products and brand content 2 Write the possessive form for each noun.1. researcherresearcher's2. women3. bicycle4. advisors5. office6. Dickens7. puppies8. house state three problems associated with the use of moderntelecommunication