answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lina2011 [118]
2 years ago
9

Apart from the challenges of heterogeneity, business and social change and trust and security, identify other problems and chall

enges that software engineering is likely to face in the 21st century (hint: think about the environment).
Computers and Technology
1 answer:
Klio2033 [76]2 years ago
7 0

Answer:

The challenge of cost control

The challenge of competence

The challenge of reduced system delivery times.

Explanation:The Challenge of Cost control is a major challenge affecting the software engineering in the 21st century,the cost of Microchips and other hardware are constantly rising.

The challenge of competence is another major challenge affecting software engineering in the 21st century,as most software engineers lack the required competence to handle some of the issues facing softwares.

The challenge of reduced system delivery times is a major challenge likely to affect software engineering in the 21st century,as people required the software to be available in the shortest possible time.

You might be interested in
A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.
algol [13]

Answer:

Threat assessment

Explanation:

A threat assessment deals with the potential for weaknesses within the existing infrastructure to be exploited.

Threat Assessment is further explained as the practice of determining or ascertaining the credibility and seriousness of a potential threat, and also the probability or chases of the threat will becoming a reality.

Threat assessment is separate to the more established procedure of violence-risk assessment, which seek to forcast an individual's general capacity and tendency to respond to situations violently. Instead, threat assessment aims to interrupt people on a route to commit "predatory or instrumental violence, the type of behavior connected with targeted attacks".

3 0
2 years ago
Read 2 more answers
Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements
Sladkaya [172]

The question is incomplete as the scenarios are not given that were to be matched by the given encryption algorithms.

By finding the question from internet i have attached the image of the scenarios in the form of table and answered below accordingly

<h2>Answer:</h2>

<u>Scenario A:</u>

Advanced Encryption Standard (AES) is a technique that uses 256-bit cipher texts for encryption process. The data encrypted by AES cannot be attacked and even it cannot be decrypted unless a brute-force search is used through all of possible 256-bit keys.For mobile security it is known as one of the best algorithms.

<u>Scenario B:</u>

Following are the techniques of encryption used for given scenario:

  • ECC
  • Digital Signature
  • AES
  • Blowfish

<u>Scenario C:</u>

Following are the techniques of encryption used for given scenario:

  • ECC
  • Blowfish

<u>Scenario D:</u>

Secure Sockets Layer (SSL) - SSL is a protocol that is commonly-used for managment of the message transmission security over the Internet)

<u>Scenario E:</u>

Advanced Encryption Standard (AES) - AES is an encryption algorithm used by U.S. Government agencies for securing sensitive but unclassified material .

i hope it will help you!

5 0
1 year ago
HELP ASAP U GET BRAINLIEST
Korolek [52]
B) <span>tool bar

i hope helped ^-^</span>
7 0
1 year ago
Read 2 more answers
Shirley was unsure about what career to go into. Her high school counselor suggested a personal assessment to point out Shirley’
Alex73 [517]
<span>I think that she would be well suited in going into law enforcement or fire fighting. Since she loves to stay active and is cool under pressure, both of those jobs would be very well suited for her personality. Those 2 jobs demand to stay cool into delicate situations. Also, she would be able to come in to help people in need.</span>
4 0
2 years ago
Read 2 more answers
(Displaying a Sentence with Its Words Reversed) Write an application that inputs a line of text, tokenizes the line with String
Serjik [45]

Answer:

I am writing a JAVA and Python program. Let me know if you want the program in some other programming language.

import java.util.Scanner; // class for taking input from user

public class Reverse{ //class to reverse a sentence

public static void main(String[] args) { //start of main() function body

Scanner input = new Scanner(System.in); //create a Scanner class object

   System.out.print("Enter a sentence: "); //prompts user to enter a sentence

   String sentence = input.nextLine(); // scans and reads input sentence

   String[] tokens = sentence.split(" "); // split the sentence into tokens using split() method and a space as delimiter

   for (int i = tokens.length - 1; i >= 0; i--) { //loop that iterates through the tokens of the sentence in reverse order

       System.out.println(tokens[i]); } } } // print the sentence tokens in reverse order

Explanation:

In JAVA program the user is asked to input a sentence. The sentence is then broken into tokens using split() method. split method returns an array of strings after splitting or breaking the sentence based on the delimiter. Here the delimiter used is space characters. So split() method splits the sentence into tokens based on the space as delimiter to separate the words in the sentence. Next the for loop is used to iterate through the tokens as following:

Suppose the input sentence is "How are you"

After split() method it becomes:

How

are

you

Next the loop has a variable i which initialized to the tokens.length-1. This loop will continue to execute till the value of i remains greater than or equals to 0.

for (int i = tokens.length - 1; i >= 0; i--)

The length of first token i.e you is 3 so the loop executes and prints the word you.

Then at next iteration the value of i is decremented by 1 and now it points at the token are and prints the word are

Next iteration the value of i is again decremented by i and it prints the word How.

This can be achieved in Python as:

def reverse(sentence):

   rev_tokens = ' '.join(reversed(sentence.split(' ')))

   return rev_tokens

   

line = input("enter a sentence: ")

print((reverse(line)))

The method reverse takes a sentence as parameter. Then rev_tokens = ' '.join(reversed(sentence.split(' ')))  statement first splits the sentence into array of words/tokens using space as a delimiter. Next reversed() method returns the reversed sentence.  Next the join() method join the reversed words of the sentence using a space separator ' '.join(). If you want to represent the reversed tokens each in a separate line then change the above statement as follows:

rev_tokens = '\n'.join(reversed(sentence.split(' ')))  

Here the join method joins the reversed words separating them with a new line.

Simply input a line of text and call this reverse() method by passing the input line to it.

4 0
1 year ago
Other questions:
  • A chemical found in the synaptic vesicles , which , when released . has an effect on the next cell is called a?
    10·1 answer
  • The final step of the DHCP Discovery process is known as ______.
    5·1 answer
  • Secure Wi-Fi networks and VPNs use _____ to secure data transferred over a network.
    13·1 answer
  • Select the correct answer. Rachel needs to make a presentation on ethics and etiquettes in college. She has about 30 minutes to
    13·1 answer
  • 1.2.2: Output variable value. Jump to level 1 Write a statement that outputs variable userAge. End with a newline. 1 2 3 4 5 6 7
    12·1 answer
  • A computer system uses passwords that are six characters and each character is one of the 26 letters (a-z) or 10 integers (0-9).
    13·1 answer
  • Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention
    9·1 answer
  • Design a program that asks the user for a series of names (in no particular order). After the final person’s name has been enter
    5·1 answer
  • TQ Artificial Intelligence (AI)
    15·1 answer
  • A homeowner uses a smart assistant to set the house alarm, get packages delivery updates, and set time on the outdoor lights. Wh
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!