In this scenario, the Agile approach (method) that is being used and described is referred to as Kanban.
What is SDLC?SDLC is an abbreviation for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs.
What is Agile software development?In Agile software development, the software development team are more focused on producing efficiently and effectively working software programs with less effort on documentation.
In this scenario, we can infer and logically deduce that the Agile approach (method) that is being used and described is referred to as Kanban because it necessitates and facilitates real-time capacity communication among staffs, as well as complete work openness.
Read more on software development here: brainly.com/question/26324021
#SPJ1
Complete Question:
A major hospital uses an Agile approach to manage surgery schedules. A large board set up in a common office allows staff to quickly identify which procedures are scheduled, the times they are scheduled, and who is involved. Which method is described in this scenario?
A. Journey
B. Mapping
C. Waterfall
D. Kanban
E. Sprint
F. I don't know this ye
What are the different elements of a window?
Answer: title bar, menu bar, the workspace
Explanation:
Your dashboard shows total cars sold by city. how will the data be impacted if you set a condition filter for sum of cars sold greater than 100?
The data be impacted if you set a condition filter for sum of cars sold greater than 100 as the dashboard will only depict the cities that has more than 100 cars are sold.
What is filter pf pages or picture?Image or page filtering is known to be the act of altering or changing the form of an image and also reducing a page to the items that one wants.
Note that in filtering, it tends to bring about those areas that one has interest in and as such, in the case above, The data be impacted if you set a condition filter for sum of cars sold greater than 100 as the dashboard will only depict the cities that has more than 100 cars are sold.
Learn more about filter from
https://brainly.com/question/3198358
#SPJ1
What creates two completely separate user interfaces on the same device, one for work and one for personal use?
A technology which is designed and developed to create two (2) completely separate graphic user interfaces on the same device, one for work and one for personal use is referred to as dual persona technology.
What is technology?Technology can be defined as a field of science that involves the process of creating, applying, and managing scientific knowledge and ideas, so as to effectively and efficiently proffer solutions to various problems and cause an improvement in human life.
What is a dual persona technology?A dual persona technology can be defined as a type of technology which is designed and developed to create two (2) completely separate graphic user interfaces on the same electronic device, one to be used for work and the other one for personal use.
Read more on technology here: https://brainly.com/question/17893201
#SPJ1
In what document does the program manager (pm) address the demilitarization and disposal requirements?
Life Cycle Sustainment Plan (LCSP) is the document that the program manager (pm) addresses the demilitarization and disposal requirements.
What is Life Cycle Sustainment Plan?Life Cycle Sustainment Plan is a plan or service that works during the trade of weapons or system work regarding militarization. This system works on the development and handling of the weapon system.
So, Life Cycle Sustainment Plan will be used in the demilitarization and management requirements.
Thus, the name of the document program is Life Cycle Sustainment Plan.
To learn more about Life Cycle Sustainment Plan, refer to the below link:
https://brainly.com/question/1272845?referrer=searchResults
#SPJ1
Which network monitoring method can be used to ensure that all traffic sent to any port on a switch is also sent to a device connected to the mirrored port?
A network monitoring method (technique) which can be used to ensure that all traffic sent to any port on a switch is also sent to a network device that is connected to the mirrored port is referred to as port mirroring.
What is a content switch?A content switch can be defined as a class of switch which is designed and developed for the programmatic redirection of request traffic of a client from one server, which was initially selected by load balancing to another server selected based on the content of the request or header.
What is port mirroring?Port mirroring can be defined as a network monitoring method (technique) which is designed and developed to ensure that all traffic that are sent to any port on a switch, is also sent to a network device that is connected to the mirrored port.
In this context, we can infer and logically deduce that the network monitoring method used is referred to as port mirroring.
Read more on switches here: brainly.com/question/14850209
#SPJ1
The ability for new computers to be automatically connected to the network is provided by the:________
Answer:
DHCP server
Explanation:
One of the key advantages the soviet union held over the united states on a global scale was america's continuing issue of:________
Explanation:
The Americans had a greater nuclear power with more than 300 land based intercontinental ballistic missiles (ICBMs) and a fleet of Polaris submarines. The Soviet Union had only 4 to 6 land based ICBMs and around 100 short range primitive V1 type cruise missiles that could only be launched from surfaced submarines.
When network traffic is encrypted, it is invisible and its content and purpose are masked.
a. true
b. false
Answer:
true
Explanation:
encryption is when you scramble the contents of information
in which year computer was invented
A _____ standard describes the requirements for obtaining a domain name for use by external parties?
A DNS control standard describes the requirements for obtaining a domain name for use by external parties.
What is a domain name?A domain name is a name that is easy and easy to remember. The name is used for online websites for companies or vlogs that contain an IP address on the internet. It is like the street address.
The DNS control system is a system that is used by every domain name user. It controls how visitors would see the website and how they will receive emails.
Thus, the standard requirement for obtaining a domain name is the DNS control standard.
To learn more about the domain name, refer to the below link:
https://brainly.com/question/3044569
#SPJ1
Can you think of a situation that might create a problem for a website’s security? What could a back-end developer do to prevent this situation from occurring?
A situation that might create a problem for a website’s security is known o be as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.
Others are;
Lack of authentication in company security. Access control-linked misconfigurations.A Software misconfigurations.What could a back-end developer do to prevent this situation from occurring?Always Encrypt sensitive data: Do not use weak encryption algorithm.The back end in cyber security is know to be a sort of a kind of a repository of all that entails your web presence and also that of your mobile apps and it is one that makes it to run smoothly.
Hence, A situation that might create a problem for a website’s security is known o be as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.
Learn more about website’s security from
https://brainly.com/question/10450768
#SPJ1
Write any two uses of the paint program
Image reformatting - For instance, modifying a GIF to a JPEG. Drawing shapes. Resize and rotate images. Basic image editing such as red eye and difference
A paintbrush is utilized for drawing, coloring, and editing the pictures. We can use Paint Brush like a digital sketchpad to make straightforward pictures. Files created in Paint Brush are saved as bitmap files.
What are the main features of the paint program?
Features contained in the paint are pencil, brush and airbrush tool. The capability to add text, lines and shapes. Also contained are an eraser, magnifier, and fill colour tools.
What is the use of paint program?
A paint program is a software pictures program that allows the user to draw, color, or paint bitmapped images on a computer. Though most are finished, examples include: KolourPaint, XPaint, Deluxe Paint, MacPaint, and Microsoft Paint, which is displayed in the picture
To learn more about paint program, refer
https://brainly.com/question/1407666
#SPJ9
You are a business consultant troubleshooting a failed information system. You discover that employees face negative incentives to using the system. Which component is causing the failure?
Given that the employees face negative incentives to using the system the system component that is responsible for this failure can be said to be the people.
What is a component failure?This is the term that is used to refer to the failure of a group of components at a particular period of time. This is usually the statistical probability of failure.
In a situation where the failure is due to the fact that the employees face negative incentives to using the system we can know the reason for such a failure is the people.
Read more on failure here: https://brainly.com/question/15949912
#SPJ1
____ is a temporary holding area for data, application program instructions, and the operating system.
enumerate five features of Microsoft excel 2016
Answer:
Smarter Autocorrect, Improved Functions of Excel Workbook, New Funnel charts, and Smarter insertion of pictures.
Explanation:
For 8 features of Microsoft excel 2016, check out this website:
https://www.educba.com/features-of-2016-excel-workbook/
Hope this helps!
list the different services provided by computer network
Answer:
access to the World Wide Web, digital video, digital audio, shared use of application and storage servers
What is a brute force attack? What are the ways you can make it harder for someone to use crack your credentials using a brute force attack?
Explanation:
A brute attack is a method of cracking someone's password/credentials using a predefined set or list of commonly used passwords or from a database leak.
We can prevent our passwords from being brute forced by using a combination of password with no dictionary words and using many symbols and numbers with both upper and lower case characters.
The critical components of the operating that remain in memory as long as the computer is running are commonly known as the:______.
Answer:
Kernel
Explanation:
The answer is Kernel.
Hope this helps!
What tool allows you to discover, cleanse, and transform data with built-in operations?
Watson Studio Refinery tool allows you to discover, cleanse, and transform data with built-in operations.
What is meant by data cleaning?Data cleaning is known to be the act putting together or the fixing/removing any data that is found to be incorrect, corrupted, or one that is incorrectly formatted, copied , or incomplete data that is seen inside a dataset.
Note that in combining multiple data sources, there are a lot of room for for data to be copied or mislabeled.
Watson Studio Refinery, which is known to be obtained via IBM Watson Studio is said to be a tool that allows a person to discover, cleanse, and transform data using built-in operations.
Therefore, Watson Studio Refinery tool allows you to discover, cleanse, and transform data with built-in operations.
Learn more about data cleaning from
https://brainly.com/question/13085801
#SPJ1
14. How do digital libraries address the problem of digital exclusion?
O A. They allow web conferencing so people may connect with friends and relatives.
OB. They make it worse because digitally illiterate people are unable to read books.
O C. They reach out to people who need technology and help teach them digital literacy skills.
O D. They provide free virus protection to people who need it most.
The digital libraries address the problem of digital exclusion by: They reach out to people who need technology and help teach them digital literacy skills.
What does it mean to be digitally excluded?The digital exclusion is known to be also as digital divide and this is known to be where a part of the population is known to possess a continuous and unequal access and capacity in regards to the use Information and Communications Technologies (ICT),
Note that IT are very essential for all to be fully participated in the society and the digital libraries address the problem of digital exclusion by: They reach out to people who need technology and help teach them digital literacy skills.
Learn more about digital exclusion from
https://brainly.com/question/7478471
#SPJ1
5 The following text is stored as a text file:
She sells sea shells on the seashore. The shells that she sells are sea shells I am sure. Explain how lossless compression would compress this file.
Lossless compression decreases file size without removing any bits of information. Instead, this format works by removing sameness within data to reduce the overall file size. With lossless, it is possible to perfectly rebuild the original file.
What utilizes lossless compression?
Lossless compression is commonly used for so-called "discrete" data, such as database records, spreadsheets, word-processing files, and even some types of image and video information. Text compression is a powerful area for lossless compression.
What is lossless compression example?
Lossless compression methods are reversible. Examples of lossless reduction include GZIP, Brotli, WebP, and PNG, Lossy compression, on the other hand, uses inexact approximations by dumping some data from the original file, making it an irreversible compression process
To learn more about Lossless compression, refer
https://brainly.com/question/17266589
#SPJ9
Helen designed a new payroll system that she offers to her customers. She hosts the payroll system in AWS and her customers access it through the web. What tier of cloud computing best describes Helen's service
Helen designed a new payroll system that she offers to her customers. She hosts the payroll system in AWS and her customers access it through the web. Software as a service tier of cloud computing best describes Helen's service
This is further explained below.
What is Software?Generally, The term "software" refers to a collection of instructions, data, or programs that are used to control computers and carry out certain activities. In contrast to hardware, which refers to the tangible components of a computer, this refers to the software that runs on the device. The phrase "software" refers to apps, scripts, and programs that may be executed on a device. Software is a general term.
In conclusion, Helen is now providing her clients with a newly developed payroll system that she devised herself. Her clients log in to the AWS-hosted payroll system using the web interface that she provides for them. The layer of cloud computing known as software as a service is the one that most accurately reflects Helen's service.
Read more about Software
https://brainly.com/question/1022352
#SPJ1
What information will she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records?
The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .
What is an incomplete health record or a delinquent health record?
An incomplete health record is one that is often open after a set period of time such as more than 30 days and if not complete, the health record is said to be delinquent.
Note that Nurses are mandated to carefully maintain patient records. Therefore, The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .
Learn more about chief medical officer from
https://brainly.com/question/18696862
#SPJ1
A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy
Answer:
The answer is honeypot.
workin ng principle of the computer? e. Why does a computer need programs? f. What is Random Access Memory? g. What are the types of internal memory? Vrite short answer to the following an
Working principle of the computer is Users are only vaguely aware of the central processor unit, which is an invisible element of a computer system.
They supply input data to the computer in order to obtain processed data, or output. In some cases, the output is a direct answer to the input.
Why does a computer need programs?
Programming languages use types and functions that control commands. The reason that programming is so significant is that it directs a computer to complete these orders over and over again, so people do not have to do the task frequently. Instead, the software can do it automatically and accurately
What is random access memory explain?
RAM (Random Access Memory) is the hardware in a computing machine where the operating system (OS), application programs and data in everyday use are kept so they can be quickly reached by the device's processor. RAM is the primary memory in a computer.
What are the types of internal memory?
There are two kinds of internal memory is ROM and RAM. ROM stands for read-only memory. It is non-volatile, which suggests it can retain data even without control
To learn more about Programming languages, refer
https://brainly.com/question/16936315
#SPJ9
A field value is currently not in any group. what happens when you try adding it to an existing group?
When a field value is currently not in any group, What happens when you try adding it to an existing group is that It is removed from the "all" list, and placed under its new group.
What is a field value?The value of a field can be described as the string of bytes, which do contains all bytes in the field after the first colon.
The field value function is is useful in a case whereby extraction of the field data from linked data types is needed.
It is a good method thst used when writing formulas that refer to data types, and that is why the field value do help the user when creating a conditional calculations using a linked data types.
It also gives the enablement in the extraction of the exact values from the cell linked to data types.
It should be noted that this field value is concatenation of all the lines found in the the field, outside the starting name and colon, hence When a field value is currently not in any group, What happens when you try adding it to an existing group is that It is removed from the "all" list, and placed under its new group.
Find out more on field value at https://brainly.com/question/843074
#SPJ1
test generators can be very helpful when trying to determine if a code runs properly or fails in some situations. For example, let’s say that you were writing a program where the user would input their test grades and the program would tell them their average. What kinds of data would a test generator want to test for that program to be sure that it would work in all situations?
A data type which a test generator would test for in this software program to ensure it would work in all situations is an int or a float input.
The kinds of data type.Basically , there are five (5) main recognized data types used in computer programming and these include the following:
Character type (char).Floating point type (float).Integer type (int).Boolean (bool)String (str)What is a test generator?A test generator can be defined as a type of software program that is designed and developed to determine whether or not a code runs properly or fails in some situations.
In Computer programming, we can infer and logically deduce that a data type which a test generator would test for in this software program to ensure it would work in all situations is an int or a float input.
Read more on a float input here: https://brainly.com/question/15345900
#SPJ1
the three basic steps of a CPU are fetch, decode, and execute. Some experts describe this cycle as simply “fetch-execute.” Do you think the three-step description or the two-step description provides a better explanation of how a CPU works? Why?.
I believe the statement of the three -step description and it is known to be the basic operation of a computer as the CPU is made to understand these set of instructions.
What is the cycle about?The basic operation of any system is known to be the ‘fetch-execute’ cycle. It is said to be one that fetches the instructions usually from the central memory and then it is said to executes them.
Note that
The CPU fetches the instructions.The CPU also decodes the instruction.The CPU also executes the instruction.Hence, I believe the statement of the three -step description and it is known to be the basic operation of a computer as the CPU is made to understand these set of instructions.
Learn more about fetch-execute cycle from
https://brainly.com/question/9964445
#SPJ1
The maximum quantity that an economy can produce, given its existing levels of labor, physical capital, technology, and institutions, is called:________
The maximum quantity that an economy can produce, given its existing levels of labor, physical capital, technology, and institutions, is called Potential GDP.
What is meant by GDP?GDP is known to be the term hat looks into or one that measures the monetary worth of final goods and services and it is one which is said to be bought by the final user.
What is Potential GDP?Potential GDP is known to be called full-employment GDP and this is said to be the maximum rate or quantity that an economy is known to be able to make or produce given full employment of its former levels of labor, physical capital, and others.
Hence, The maximum quantity that an economy can produce, given its existing levels of labor, physical capital, technology, and institutions, is called Potential GDP.
Learn more about Potential GDP from
https://brainly.com/question/13824314
#SPJ1
A____consists of many users and their information.
Active Directory consist of many users and their information.
Answer:
Active Directory
Explanation: