When modeling a system, i need to model that my system will use 1 representative and 3 customers. this is an example of ______. (choose one)

Answers

Answer 1

That exemplifies association. The interdisciplinary study of the use of models to envision and build systems in business and IT development is known as systems modeling.

Function modeling, which uses specialized methods like the Functional Flow Block Diagram and IDEF0, is a typical sort of systems modeling. Functional decomposition can be used to extend these models, and they can be connected to requirements models for further system division.

As opposed to functional modeling, architectural modeling makes use of the systems architecture to conceptually represent the structure, behavior, and other aspects of a system.

Learn more about system modeling https://brainly.com/question/5017673?

#SPJ4


Related Questions

The actual implementation of relational databases was delayed for many years after the theory was developed. what caused this delay?

Answers

The actual implementation of relational databases was delayed for many years after the theory was developed because the generation of computers didn't have the processing power and capability to make relational database software systems practical.

What is a relational database?

A relational database can be defined as a type of database that is designed and developed to store, structure and recognize relation that are existing between data points and items of information.

Based on historical records and information, we can logically deduce that the actual implementation of relational databases was delayed for several years after the theory was developed by engineers and scientist because the generation of computers at that time didn't have the processing power and capability to make relational database software systems practical.

Read more on relational database here: https://brainly.com/question/28119648

#SPJ1

The explosion that forces the piston downward which supplies power to a machine is ignited by the ??
A pilot light
B compression chamber
C ignition manger
D none

Answers

Answer:

Explanation:

The air and fuel in the combustion chamber is compressed as the piston moves upward. The spark plug that ignites the fuel and air results in an explosion that pushes the piston back down again.

An opening bid or a target point are what a negotiator wants, but ________ are why the negotiator wants them. group of answer choices
a. issues
b. batnas
c. goals
d. interests

Answers

An opening bid or a target point is what a negotiator wants, but interests are why the negotiator wants them. Thus, the correct option for this question is D.

What do you mean by Negotiator?

A Negotiator may be defined as a type of person who has formal coversation with someone else in order to outstetch an agreement.

An opening bid is also known as the target point that a negotiator initially wants it. But the influence of interests makes the possible outcome that leads to the negotiator accurately wants in any circumstances.

Therefore, an opening bid or a target point is what a negotiator wants, but interests are why the negotiator wants them. Thus, the correct option for this question is D.

To learn more about Negotiator, refer to the link:

https://brainly.com/question/16553795

#SPJ1

A(n) ___ on android provides automatically-updating information without the need to open an app. gui icon widget live tile

Answers

A widget on android provides automatically-updating information without the need to open an app.

What are Software widget?

A software widget is known to be a kind of an application that is said to be relatively easy as well as simple to use form of software application or parts that are made for one or a lot of software platforms.

Note that a desk accessory or what we call applet is said to be a good example of a simple widget.

Therefore,  A widget on android provides automatically-updating information without the need to open an app.

Learn more about widget from

https://brainly.com/question/4448210

#SPJ1

Help me please!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!????????????????
Briefly explain to me how and why teams are important. Has there ever been a successful person who had no help at all? A person who has ever taught themselves everything without the help of others. If not, explain why it is impossible but if so, explain why it is impossible (10-14 complete sentences)

Answers

Answer:

teams are important because, you can get other people ideas to improve yours. There have been people who have been successful but, could have done better. No one has ever taught themselves because if you do something wrong then you wont know. Teams can help you fix things you have done wrong. They also can help with big projects taking up less time for you and other people. With the help of a team you can accomplish big feats in a short time frame.

Explanation:

What is the process of ensuring anti-malware software and data is up to date. mandate daily updates.

Answers

Assuring by checking

Which of the following operating systems would allow a user to add functionality and sell or give away their versions?

Answers

Linux is the operating systems would allow a user to add functionality and sell or give away their versions.

What is Linux Operating system?

Linux is known to be a kind of an an Operating system which is known to be an open-source.  It is one that is compared to Unix-like form of operating system but it is one that is often based on the the use of Linux kernel.

Note that this is said to be an operating system kernel that was said to be released in 1991, by Linus Torvalds. Linux is said to be one that is often packaged as a service of a Linux distribution.

Linux is used in a lot of ways such as the Server OS that is made for web servers, database servers, as well as file servers.

They are known to be set up to aid high-volume as well as multithreading applications and also used for a lot of server types.

Therefore, Linux is the operating systems would allow a user to add functionality and sell or give away their versions.

Hence, option A is correct.

Learn more about Linux from

https://brainly.com/question/12853667
#SPJ1

Which of the following operating systems would allow a user to add functionality and sell or give away their versions?

-Linux

-macOS

-Windows

-UNIX

Which switch is used with the windows netstat utility to show name of a running program?

Answers

Answer:

-b

Explanation:

Examine the following code segment:

data = 3. 16

new_data = CAST (data)

print("Length of Data:", len())

What data type (if any) should replace the word CAST on line 2 to ensure the code segment runs

without error?

O

str

O int

float

O Nothing should be changed

Answers

Answer:

float

Explanation:

I'm in python and i have a A

Which of the following is NOT a long-term storage device?
Compact disc
Flash drive
Hard disk
RAM
o following us E persistent memory chips to store data

Answers

The storage device which is not a long-term storage device is: D. RAM.

Types of computer memory.

In Computer technology, there are two (2) main types of memory or storage location for software program (application) that are being used on a computer and these include the following;

Read only memory (ROM)Random access memory (RAM)

What is RAM?

RAM is an abbreviation for random access memory and it can be defined as a volatile and temporary storage (memory) location that is used for currently opened software program (application) and computer data.

In conclusion, we can reasonably and logically deduce that the storage device which is not a long-term storage device is random access memory (RAM).

Read more on RAM here: https://brainly.com/question/13748829

#SPJ1

Ups developed software called ____ to enable u.s. customs and border protection agents to inspect packages that pass through the worldport international hub in louisville.

Answers

Ups developed software called target search to enable u.s. customs and border protection agents to inspect packages that pass through the worldport international hub in louisville.

An American international shipping, receiving, and supply chain management corporation, United Parcel Service, was established in 1907. The American Messenger Firm, which first specialized in telegraphs, evolved into UPS, one of the biggest shipping couriers in the world and a Fortune 500 company.

Today, UPS is most well-known for its ground delivery services and the UPS Store, a retail network that helps UPS packages and offers equipment for small businesses.

Learn more about UPS https://brainly.com/question/27583268

#SPJ4

you are attempting to boot a new system. the boot fails, and the system sounds a beep code. which of the following describes the most likely cause of this error?

Answers

The factor that describes the most likely cause of this error is:

Either no memory is installed or the memory was not detected.

What is the above case about?

A Boot Missing is known to be called a Boot Failed error and this is said to be a kind of  a Windows startup error that often shows up if  a PC or laptop fails to see or load the Windows boot files.

Note that in the case above, If the system boot fails and there is a sounds such as a beep code, the main reason for this issue will be due to absence of  memory that is installed or the memory was not seen.

If a card or memory module is said to  not been seated, or the system is one that has some  unsupported memory, the system will boots, but the display will  not show.

Hence, The factor that describes the most likely cause of this error is:

Either no memory is installed or the memory was not detected.

Learn more about boot fails from

https://brainly.com/question/10811580

#SPJ 1

See the options below

Either no memory is installed or the memory was not detected.

After a memory upgrade-ensure that the memory is compatible and was installed and configured properly.

the display will remain blank. If good fails to recognize all of the memory, the system will boot.

Answer:

Either no memory is installed or the memory was not detected.

Can the word respect be turned into a different tense?

Answers

Yes, the  word respect can be turned into a different tense.

What tense is respect?

The terms respect means for a person to be humble and down to earth.

Note that the present tense is respects while the  present participle is known to be respecting, the past tense is  said to be respected and the past participle is known as respected

Therefore the Conjugation of Respect  is one that can be done into Present Continuous Tense, Present Perfect Tense as well as others.

Therefore, my response is Yes, the  word respect can be turned into a different tense.

Learn more about tense from

https://brainly.com/question/898578

#SPJ1

What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?

Answers

The factor that can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password is option b: ​Enable a lock screen.

What are lock screen widgets?

The lock screen is known to be a tool that helps a person to be able to keep their phones and others from been access by any other person.

Note that a person can personalize their home screen or lock screen with the use of little squares or any kind of rectangles of information.

Therefore, The factor that can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password is option b: ​Enable a lock screen.

Learn more about lock screen from

https://brainly.com/question/25737640

#SPJ1

​What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?

​Enable a smart card

​Enable a lock screen

​Enable a sleep time setting

​Enable a challenge-response screen

what do i do for this not to stop me from trying to ask a question. / What phrases are / could be hurtful to brainly? - Don't use such phrases here, not cool! It hurts our feelings :(

Answers

I’m mad confused like the person on top

Which protocol enables you to control a remote computer from a local computer over a network?

Answers

Answer:

RDP

Explanation:

RDP is a secure, interoperable protocol that creates secure connections between clients, servers and virtual machines. RDP works across different Windows OSes and devices and provides strong physical security through remote data storage.

please make my answer as brainelist

To create a new primary partition within the fdisk interactive utility, which letter should be typed?

Answers

Answer:

The letter "n".

Explanation:

You would apply a ________, which is a collection of design choices that includes colors, fonts, and special effects used to give a consistent look to your work.

Answers

You would apply a Theme, which is a collection of design choices that includes colors, fonts, and special effects used to give a consistent look to your work.

What is said to be Theme?

A theme is known to be a kind of a mix up or the combination of some set of colors, fonts, as well as visual effects.

It is one that a person can be able to use to tell about their slides as a kind of consistent, professional appearance.

Therefore, You would apply a Theme, which is a collection of design choices that includes colors, fonts, and special effects used to give a consistent look to your work.

Learn more about special effects  from

https://brainly.com/question/1262098
#SPJ1

john needs to identify public key systems that generate different, random public keys for each session and, even if a key gets stolen, should not reveal more than one message. which public key system should john suggest?

Answers

A public key system which John should suggest is perfect forward secrecy.

What is an encryption?

An encryption can be defined as a form of cryptography and it typically involves the process of converting or encoding information in plain text into a code, known as a ciphertext. Generally speaking, an information or data that has been encrypted it can only be accessed and deciphered by an authorized user.

In Computer programming, some examples of encryption algorithms include the following:

3DESAESRC4RC5RSA

What is perfect forward secrecy?

Perfect forward secrecy (PFS) is also referred to as forward secrecy (FS) and it can be defined as an encryption system that is designed and developed to frequently and automatically change the public keys which were used to encrypt and decrypt information.

In this context, we can reasonably infer and logically deduce that a public key system which John should suggest is perfect forward secrecy.

Read more on encryption here: https://brainly.com/question/9979590

#SPJ1

when a malicious attacker coordinates a denial of service (dos) attack against your organization, which security objective is most impacted in a negative way?

Answers

Answer:

Availability.

Explanation:

you are a network technician for a small corporate network. your manager has decided to switch to a new isp. the network needs to be moved to the new isp so that the old one can be cancelled. the new isp has run a fiber optic line directly to the back of the fiber patch panel in the basement networking closet, but the nsa device doesn't have any fiber ports. because the nsa doesn't have any fiber ports, you need to use a media converter to convert from a fiber optic cable to an ethernet cable. most media converters use sfp ports so they can convert multiple form factors. the media converter in this lab already has a fiber sfp module installed. use the following information to make the proper connections: the isp is connected to ports 23 and 24 of the fiber patch panel. port 23 is tx. port 24 is rx. use the color coding on the end of the fiber optic cables to identify which end is tx and which is rx. connector a (white or red) is tx. connector b (black) is rx.

Answers

The steps to take are:

You need to add the Media Converter to that of the Basement  that is in the WorkspaceThen shift  the Ethernet cable from the wall socket to that of the Media Converter's Ethernet port.The one can link (Connect) to the SC to LC fiber cable to that of the Media -Converter's LC port.One also need to link up the SC to LC cable to ports 23 as well as port 24 on the fiber patch panel that tends to show detailsThen do plug in the said Media ConverterLastly do look to see if the office has an Internet connection.

What is the technician job about in the above case?

Due to the fact that the NSA is one that does not have any kind of fiber ports, the user is one that  need to make use of a media converter to be able to convert from a fiber optic cable down to an Ethernet cable.

A lot of media converters are known to make use SFP ports so they can convert multiple form factors.

Therefore, The steps to take are:

You need to add the Media Converter to that of the Basement  that is in the WorkspaceThen shift  the Ethernet cable from the wall socket to that of the Media Converter's Ethernet port.The one can link (Connect) to the SC to LC fiber cable to that of the Media -Converter's LC port.One also need to link up the SC to LC cable to ports 23 as well as port 24 on the fiber patch panel that tends to show detailsThen do plug in the said Media ConverterLastly do look to see if the office has an Internet connection.

Learn more about network technician from

https://brainly.com/question/28064117

#SPJ1

How many bits must be reallocated from host id to network id to create 16 subnets?

Answers

4 bits is needed to be reallocated from host ID to network ID to create 16 subnets. The question is about network protocol.

An established set of guidelines that govern how data is transferred between various devices connected to the same network is known as a network protocol. In essence, it enables interconnected devices to interact with one another despite any variations in their internal workings, organizational structures, or aesthetics. Network protocols are essential to modern digital communications because they make it possible to communicate with people anywhere in the globe.

Learn more about network protocols https://brainly.com/question/13327017

#SPJ4

when an unlisted procedure or service code is reported, a special report must accompany the claim to describe of the procedure or service.

Answers

When an unlisted procedure or service code is reported, a special report must accompany the claim to describe the nature, extent, and need of the procedure or service. This question is part of unlisted code.

Due to the fact that unlisted codes do not specify standard procedural elements or the level of effort or expertise necessary for the service, relative value units (RVUs) are not assigned to them. It is required to give detailed information about the procedure(s) the code refers to when utilizing an unlisted code (i.e., operative note, office notes). A sufficient definition or explanation of the nature, scope, and necessity for the procedure or service, as well as the amount of time, effort, and equipment required to deliver the service, should be included in the supporting documentation.

Learn more about unlisted code https://brainly.com/question/4734557

#SPJ4

Which dce would you use if you wanted to extend a wired network by adding more ports?

Answers

The DCE  that a person would use if you wanted to extend a wired network by adding more ports is option a. Hub.

What is DCE in networking?

A data circuit-terminating equipment (DCE) is known to be a kind of a device that  is often used to sits between the data terminal equipment (DTE) and that of a data transmission circuit.

It is one that is also called data communication(s) equipment and it tends to act as a middle man.

Therefore, The DCE  that a person would use if you wanted to extend a wired network by adding more ports is option a. Hub.

Learn more about network from

https://brainly.com/question/1637942

#SPJ1

Which DCE would you use if you wanted to extend a wired network by adding more ports?

a. Hub

b. Switch

c. Bridge

d. Repeater

Use the drop-down menus to select the answer that best completes each statement.
A person who finds a way to watch a recent movie online without paying for it is violating
A student who posts an inappropriate comment about a person via social media is violating
A student who visits a school-banned website that contains offensive content is violating school rules on

Answers

A person who finds a way to watch a recent movie online without paying for it is violating movie copyright.

A student who posts an inappropriate comment about a person via social media is violating their rights to privacy.

A student who visits a school-banned website that contains offensive content is violating school rules on censorship.

What is Movie Piracy?

This refers to the illegal copying and selling of DVDs and CDs without the permission of the owner.

Hence, we can see that a person who finds a way to watch a recent movie online without paying for it is violating movie copyright.

A student who posts an inappropriate comment about a person via social media is violating their rights to privacy.

A student who visits a school-banned website that contains offensive content is violating school rules on censorship.

Read more about movie piracy here:

https://brainly.com/question/8042416

#SPJ1

Answer: all the answers are here

Explanation:

a technician is configuring a new cisco 2960 switch. what is the effect of issuing the branchsw(config-if)

Answers

When you issue the BranchSw shutdown command, a physical or virtual switch interface is disabled.

Almost all Cisco devices operate on Cisco IOS and are managed using Cisco CLI. Cisco device management is made simpler by the fact that the fundamental CLI commands are the same for all of them.

The American international technological conglomerate firm Cisco Systems, Inc., also known as Cisco, has its corporate headquarters in San Jose, California. Cisco creates, produces, and markets networking tools, computer software, telecommunications gear, and other high-tech services and goods.

With industry-leading technologies like Webex, OpenDNS, and others, Cisco focuses in particular tech areas like the Internet of Things (IoT), domain security, videoconferencing, and energy management.

Learn more about Cisco https://brainly.com/question/8986399?

#SPJ4

A technician needs to add a home wireless router. which icon should the technician select?

Answers

Answer:

Assuming they are trying to connect it to the computer, they should select the WiFi icon.

Source:
I'm an IT specialist.

consider the following two implementations of the same algorithm, each written in a different language. language a: calculate the average daily rainfall for the week (averagerainfall) by adding together the rainfall totals for each of the 7 days of the week (sun, mon, tue, wed, thu, fri, and sat) and dividing the sum by 7. language b: take the total amount of rain from each day of the week (sunday, monday, tuesday, wednesday, thursday, friday and saturday) and then average them together to get the average daily rainfall for the week (averagerainfall). which of the following statements about these two implementations is true?

Answers

The statement about these two implementations that is true is 3. Language B is ambiguous because the process of "average" is not explained well enough for someone to computationally be able to solve the problem.

What is an Algorithm?

This refers to the well defined steps and sequences that are used to solve a problem.

Hence, we can see that The statement about these two implementations that is true is 3. Language B is ambiguous because the process of "average" is not explained well enough for someone to computationally be able to solve the problem.

This is because it requires that cumulative number for rain per day of the following weeks and also the averages collectively that provide an overall total rainfall during the week.

Read more about algorithm here:

https://brainly.com/question/24953880

#SPJ1

A wbs component is a work element that is part of the wbs at any level.
a. true
b. false

Answers

It is true that a WBS component is a work element that is part of the WBS at any level.

The instrument that makes use of this method is the Work Breakdown Structure (WBS), which is a crucial project management document. To ensure that project plans are in sync, it does it on its own by integrating scope, cost, and schedule baselines.

According to the PMI Project Management Book of Knowledge, the Work Breakdown Structure is a "deliverable-oriented hierarchical decomposition of the work to be accomplished by the project team" (PMBOK). There are two types of WBS: phase-based and deliverable-based. The deliverable-based strategy is the most popular and preferred method.

Learn more about WBS https://brainly.com/question/14262396

#SPJ4

Help

Briefly explain to me how and why teams are important. Has there ever been a successful person who had no help at all? A person who has ever taught themselves everything without the help of others. If not, explain why it is impossible but if so, explain why it is impossible (10-14 complete sentences)

Answers

The reason why teams are important is because teams are created when people who has a common taste, preference or others comes to work together so that they can achieve a common goal.

Why are they important?

Studies has shown that the issue of collaborative problem solving is one that tends to leads to great and good outcomes.

Note that  People are known to be very likely to take a lot of calculated risks that can bring about innovation if they are said to have the aid or the support of a team that is standing behind them. Working in a team brings about personal growth, boast job satisfaction, and lower  stress.

Therefore, The reason why teams are important is because teams are created when people who has a common taste, preference or others comes to work together so that they can achieve a common goal.

Learn more about teamwork from

https://brainly.com/question/10061787
#SPJ1

Other Questions
the head of a nail is 0.39 cm0.39 cm in diameter. you hit it with a hammer with a force of 27 n.27 n. what is the pressure pheadphead on the head of the nail? What amendment to the u.s. constitution chiefly empowers state governments? The _____ is a group of persons within an organization who participate in the buying process and share common goals, risks, and knowledge important to the purchase decision. Explain (describe) how the beliefs and practices of the predominant religions in europe affected european society. Cost accounting logic can lead managers to keep their resources busy all the time, increasing productivity with no regard to demand. what is the negative result from this effect? for 1983 through 1989, the per capita consumption of chicken in the u.s. increased at a rate that was approximately linear. in 1983, the per capita consumption was 33.3 pounds, and in 1989 it was 48 pounds. write a linear model for per capita consumption of chicken in the u.s. let t 8. Liberal hasA. one syllable.B. two syllables.c. three syllables. changing a single amino acid in a protein consisting of 325 amino acids would . changing a single amino acid in a protein consisting of 325 amino acids would . alter the primary structure of the protein but not its tertiary structure or function cause the tertiary structure of the protein to unfold always alter the biological activity or function of the protein always alter the primary structure of the protein, sometimes alter the tertiary structure of the protein, and sometimes affect its biological activity How does the average daily water consumption per person in the united states compare to other countries? Companies recognize revenue before the cash has been collected when using ______ accounting. Effective field leaders put personal wants and needs aside and build positive working relationships based on ___ The number of neutrons in an atom can be found by subtracting the atomic number from the What was this period of time called April 9, 1870 harpers weekly Convert the following temperature to kelvin:a) 113C, the melting point of sulfur,b) 37C, the normal body temperature,c) 357C, the boiling point mercury. Which table represents a linear function? a solid sphere of radius 40.0 cm has a total positive charge of 31.9 c uniformly distributed throughout its volume. calculate the magnitude of the electric field at the following distances. Hi i need help with my work Find the distance between (0, -8) and (3, -2). Express your answer as a simplified radical, if possible.O 53O22.5O 45O 35 If m/CDE is a straight angle, DE bisects m/GDH, mZGDE = (8x-1), m/EDH = (6x +m/CDF = 43, find each measure.x =m/GDH=mZFDH=m/FDE = Following laws, as written in statues, regulations, and codes, and as interpreted by the courts is what type of behavior?O LegalMoralO CivilO Ethical