answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katovenus [111]
2 years ago
10

Q.No.3. A filling station (gas station) is to be set up for fully automated operation. Drivers swipe their credit card through a

reader connected to the pump; the card is verified by communication with a credit company computer, and a fuel limit is established. The driver may then take the fuel required. When fuel delivery is complete and the pump hose is returned to its holster, the driver's credit card account is debited with the cost of the fuel taken. The credit card is returned after debiting. If the card is invalid, the pump returns it before fuel is dispensed. As a software developer if you have to develop a software for the above given scenario, Suggest five possible problems that could arise if a you does not develop effective configuration management policies and processes for your software.
Computers and Technology
1 answer:
scZoUnD [109]2 years ago
3 0

Answer:

Following are the 5 problems, that can arise in this scenario:

Explanation:

  • When the driver swipes its credit or debit card, its connection with both the card company could not be formed due to the poor or ineffective development, therefore the driver may not put any fuel from its vehicle.  
  • It still wants to spend energy even after the card is read as incorrect.  
  • So, its total price to just be debited from the credit or debit card shall be much more and less than the real cost as well as the deduction of both the fuel should be overestimated.  
  • Its information may not adjust when a driver uses its device because the next driver could no matter how long only use the device.
  • Its fuel limit to also be established when the vehicle has stopped its card would be faulty as well as a certain restriction would not cause its device to be misused.
You might be interested in
Consider the following method, which is intended to return an array of integers that contains the elements of the parameter arr
Gennadij [26K]

Code:

public static int[] reverse(int [] arr){

Int [] newArr = new int[arr.length];

for (int k = 0; k<arr.length;k++){

/*Missing statement */

}

return newArr;

Answer:

Replace the comment with:

newArr[k] = arr[arr.length-k];

Explanation:

Required

Complete the code

In the given code:

The first line of the given code defines the method

public static int[] reverse(int [] arr){

The next line declares array newArr withe same length as array arr

Int [] newArr = new int[arr.length];

The next line iterates through the elements of array arr

for (int k = 0; k<arr.length;k++){

The /* Missing statement */ is then replaced with:

newArr[k] = arr[arr.length-k];

The above statement gets the elements of array arr in reversed order.

This is so because, as the iteration iterates through array arr in ascending order, arr.length-k gets the element in reversed order

6 0
2 years ago
_____ is a method of delivering software, in which a vendor hosts the applications, and customers access these applications over
marysya [2.9K]

Answer:

Option A: Software-as-a-service

Explanation:

Software-as-a-service (SAAS) is one of the cloud computing business models. The software is not delivered as a product hosted in the client machine. Instead, a customer just pays a subscription fee (sometimes free for limited quota) to gain access to the software which is hosted in a remote server maintainer by software vendor.

One benefit of SAAS is that the software vendor will usually responsible for software maintenance and update. The customer has no longer require to pay extra cost to upgrade the software. So long as the subscription is still valid, a customer can always access to the newest features of software.    

Some examples of SAAS which is popular include DropBox, Google App, DocuSign, Microsoft Office 365 etc.

3 0
2 years ago
To determine why a computer program started to function differently, Mel should most likely use data to
Amiraneli [1.4K]

Answer:

convince the software company of the issue

Explanation:

3 0
2 years ago
Read 2 more answers
Write a C program that right shifts an integer variable 4 bits. The program should print the integer in bits before and after th
Sindrei [870]

Solution :

#include<$\text{stdio.h}$>

#include<conio.h>

void dec_bin(int number) {

$\text{int x, y}$;

x = y = 0;

for(y = 15; y >= 0; y--) {

x = number / (1 << y);

number = number - x * (1 << y);

printf("%d", x);

}

printf("\n");

}

int main()

{

int k;

printf("Enter No u wanted to right shift by 4 : ");

scanf("%d",&k);

dec_bin(k);

k = k>>4; // right shift here.

dec_bin(k);

getch();

return 0;

}

4 0
1 year ago
The path to the distribution share should always be referred to by the ____ path to ensure that it can be accessed over the netw
ch4aika [34]

Answer:

The answer is "Option D".

Explanation:

In the network, the UNC defines a related file with the removable drive from, which the file is stored without needing interpretation. It is used to ensure, that unguarded computers can be accessed across the network and other options, that can be clarified in the following terms which are not correct:  

  • In option A, It is used to manage computers and other devices on the internet, that's why it is wrong.
  • In option B, It is also known as a server that manages network security, that's why it is wrong.
  • In option c, It is used in software designing, that's why it is wrong .
6 0
2 years ago
Other questions:
  • Which behavior could be acceptable at a classical concert as well as at a ball game? standing for an exceptional performance che
    9·2 answers
  • Isabel is creating a wireframe. She has drawn a layout for the home page along with outlining the navigation elements. She now w
    15·2 answers
  • Explain the following instructions: ADD 3000, 1050, 1900.
    12·1 answer
  • Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log o
    12·1 answer
  • Write a code segment that uses an enhanced for loop to print all elements of words that end with "ing". As an example, if words
    6·1 answer
  • Write a multithreaded program that generates the Fibonacci series using Pthreads thread library. This program should work as fol
    10·1 answer
  • 1. Used ____________ must be hot drained for 12 hours or crushed before disposal.
    15·1 answer
  • in a blank excel workbook go to insert tab on the ribbon, which of the following is Not vailable 1 smart art 2 coloumns ( not co
    9·1 answer
  • Alice just wrote a new app using Python. She tested her code and noticed some of her lines of code are out of order. Which princ
    8·1 answer
  • Animated graphics that are displayed on the screen after a set of time when the computer is unattended.​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!