The process of acquiring existing information or developing new information.

Answers

Answer 1

Answer:

Various definitions of the SDLC methodology exist, but most contain the following phases.

Preliminary Analysis. In this phase, a review is done of the request. ...

System Analysis. ...

System Design. ...

Programming. ...

Testing. ...

Implementation. ...

Maintenance.

Explanation:

There are four methods of acquiring data: collecting new data; converting/transforming legacy data; sharing/exchanging data; and purchasing data. This includes automated collection (e.g., of sensor-derived data), the manual recording of empirical observations, and obtaining existing data from other sources.


Related Questions

(Print distinct numbers) Write a program that reads in integers separated by a space in one line and displays distinct numbers in their input order and separated by exactly one space (i.e., if a number appears multiple times, it is displayed only once). Hint: Read all the numbers and store them in list1. Create a new list list2. Add a number in list1 to list2. If the number is already in the list, ignore it.

Answers

Answer:

Following are the program to the given question:

num = input("Enter numbers: ")#defining a variable num for input value  

list1 = num.split()#defining a list1 that adds value in list1  

list2 = []#defining an empty list list2

for j in range(len(list1)):#defining a for loop that checks the list value in range  

   if not list1[j] in list2:# use if block that checks multiple value

       list2.append(list1[j])#add value in list2

print("The distinct numbers are: ")#print message

for j in range(len(list2)):#defining for loop for print list value

   print(list2[j])#print list value

Output:

Enter numbers: 1 22 55 7 22 1 1 2 3

The distinct numbers are:  

1

22

55

7

2

3

Explanation:

In the above-code, a "num" variable is defined, that takes inputs from the console screen, and in the next step, "list1 and list2" is defined. In the "list1" it adds num variable value a into the list.

In the next step, a for loop is defined that checks the list value in range , and define an if block, that checks multiple value and add value into the list2, and in the next step, the for loop is defined that prints the list2 values.    

who like the videos where is clown is from :)

Answers

Answer:

i hate clowns alot especially pennywise lol

Explanation:

Which of the following binary numbers is equivalent to decimal 4?

A. 10
B. 100
C. 1010
D. 1111

Answers

Answer:

b so easy

Explanation:

Answer:

B. 100

Explanation:

Jiwoo is a professional photographer. Identify and describe a photography scenario where Jiwoo would need to consider the ethics and aesthetics of photography before proceeding. Clearly examine what ethical and aesthetic consideration she would have based on the scenario that you describe and how these relate to photography as a career or art form in general.

Answers

Answer:

Photography ethics are the principles that guide the way we take and share photos. Why is photography ethic so important? If we don't have morality in the way we use photography, we risk Aesthetics Ethics deals with the rights and wrongs and Aesthetics deals with beauty or otherwise. When we correct, manipulate or enhance images, the factors of ethics and aesthetics must always be kept in consideration. Where Does One Draw The Line if you add or remove something there that wasn’t in the scene you have crossed from documentary to fictional art. Exceptions In other cases, the only way to present a truer representation of reality is through a composite rather than with a single exposure.

Explanation:

I hope this helps I little

Which of the following is true about file formats?

Answers

It’s lil uzi Fer debí Moo cosmo I
234
Me

Answer:

i feel like the answer to this question would be ''Free file formats may be either open or closed.'' If  i'm wrong, plz let me know ^^

Explanation:

Which securities protects networks from intruders? *

Application security
Network security
Information security
Operational security

Answers

Answer:

I think it is network security

Explanation:

Heard in an ad before :T

Answer:

Use Kika Clipboard to make paste easypneumonoultramicroscopicsilicovolcanoconiosis

My coding will not work. I don't know what the issue.

Answers

Can you give us a better and larger picture please?

"During a context-switch, the process status word (PSW) of the running process is also saved." TRUE or FALSE?

Answers

Answer:

The answer is "True".

Explanation:

In the processor status word, comprising all pointers into some kind of registry account, which must be stored whenever a context switch took place. In this, each size of a process is reduced through the use of lightweight processes in such a multitasking environment, and the entire process will save through the unique process ID.

which description below would describe a library linked to a coding file?

1. Imagine to pull into your game.

2. A library helps you find errors in your code.

3. Pre-written function to be used over and over.

4. Books.

Answers

Answer:

2 im pretty sure

Explanation:

I just did this quiz and i got it correct so im pretty sure its 2 :D

Lin wants to play an online game with her friends. She read the description of the game and knows it contains several features with addictive design, including rewards for completing levels and long game times with penalties for quitting early. She likes the game but doesn’t want to get sucked in and skip her homework (which has happened before)! Name two guidelines Lin should set for herself before playing the game.

Answers

Answer:

Set a time limit for herself. Ask her parents for help monitering her app usage.

does anyone now how to make an app on code.org????
i’ll pay you if you can do it for me!!

Answers

Answer: Honestly, code.org wont get you far. I recommend you get a IDE and pick a language to learn.

I would be happy to help you im not going to make it for you but i can help walk you thought it. I know a little bit of code.org had to make something in it last year.

Which command do you use to save a document with a new name? Choose the answer.
Save As
Save New
Save Type
Save​

Answers

Answer:

Explanation:

Most word processors use Save As which not only allows you to save with a different name, but the root can be changed as well. I use LibreOffice write. Its Save As Command allows you to change the name from say J1 to Jerome and also to save the document in many of the word formats. That last ability is really important because some people only have Microsoft products. On my old computer, I have Microsoft Word 2000. If I want to transfer files, that is how I have to save the file.

One tool under What-If-Analysis is Scenarios. Which best describes the purpose of setting up and using scenarios

1. to quickly combine multiple formulas from different cells into just one
2. to instantly compare results when data in numerous cells change to specified values
3. to conduct automatic complex statistical analysis on a range of cells
4. to constrain some cells to certain values so that the wrong data are rejected if entered​

Answers

Answer:

Option B, to instantly compare results when data in numerous cells change to specified values

Explanation:

Scenario setting with in the What If Analysis is used to compare various scenarios with in the same excel sheet. Scenarios has set of values that are saves and updated automatically as the values with in the cell changes. Also the scenarios can be switched.

Hence, option B is correct

You are the leader of your school's Go Green Club, which supports environmentally friendly choices and lifestyles. Your club will represent your school in the forthcoming annual Green City competition. The school coordinator has allocated a fixed budget and a timeline of 30 days to design an ID card format that closely represents the club's theme, and to send it back to him for approval.

To get the desired creative effect, the school coordinator advised you to use desktop publishing software to create the card design and to produce them later, in the required numbers. You'll create the ID cards for the members with desktop publishing software. In your answer, mention the software you’ll use and describe the steps you'll follow to create the ID cards.

(Hint: First identify the audience, timeframe, and limitations of the task, if any. Then, identify the hardware and software to create the ID cards. Lastly, create and finalize the formatting techniques and templates for the ID card.)

Answers

Answer:

(Answers may vary.)

My Considerations

The Go Green Club has a total of 100 members. I plan to photograph each of them in front of our club's "Go Green" sign. I have a deadline of 30 days to deliver the ID cards. Therefore, I have to ensure that all the cards are printed and ready for delivery in 20 days, with 10 days of buffer time (in case the cards require any edits or changes). Additionally, after I have submitted the draft for review, I will need the coordinator's final approval on the design and layout of the ID card.

Hardware Requirements

a desktop computer or laptop with adequate memory to run the software to create the ID cardssome external storage devices, such as pen drives and DVD disks, to share the design and layout for the coordinator to review; I will also need these devices to store the final digital file for printa color scanner to scan hand-drawn artwork and signatures, which I will place on the ID carda digital camera to capture photos of members, and to transfer them to the computer/laptopa printer to make hard copies of the cards.Software Requirements

I intend to use Scribus to create the ID cards because it is a free DTP application, and has most of the common features I'd need to create an ID card.

Formatting Techniques

I plan to use the following techniques to design the club ID cards.I'll use the landscape or horizontal orientation. This will enable proper spacing for the ID card elements.I'm planning to use a card measuring 3.370 inches × 2.125 inches. A card this size will ensure that all the elements of the card are visible.I am planning to place the club logo on the top left corner, because the eye normally follows the path of the letter Z. This'll help the viewer to see the logo and identify/recognize the club.Next I'll place the club name; I'll use the top-center alignment and also vertically align it to the logo. I'll use the sans serif font for the club name.Following the Z-path rule, I'll place the member's photo to the right and the member's name under the photo. In this position, the photo and the name will be visible, and will not get mixed up with other elements. I'll print the member name with a serif font.Finally, again in line with the Z-path rule, I'll position the club seal and the club director's signature at the right lower bottom. Although these elements are essential on an ID card, they do not require as much viewer attention as the club logo, name, and member photo.

Explanation:

I used Canva for this card.

which type of hazzard are those substances which threathen you physical safety ?​

Answers

Answer:

98o

Explanation:

What is the maximum number of pixels per inch that the human eye can see on a smartphone
screen?
O 24ppi
O 60ppi
O 326ppi
O 500ppi

Answers

Answer:

326 i think

Explanation:

"There are no longer mature industries; rather, there are mature ways of doing business," he is referring to the high demand of creativity and innovation in the market

Answers

Hi, you've asked an incomplete and unclear question. However, I provided the full text below.

Explanation:

The text reads;

"When Porter says “There are no longer mature industries; rather, there are mature ways of doing business,” he is referring to the high demand for creativity and innovation in the market. Earlier we used to be more concerned about the hardware and the physical product rather than its information content, But now as a business, we need to provide more informative content with the product.

Like General Electric offers dedicated customer service for its line of goods which differentiates it from its rivals. Similarly, shipping companies like UPS now offer us to track the location of our package on a live map. This is what we call a mature business and how we can differentiate ourselves and stand out in the highly competitive market by using Information and Technology..."

Kelly has always used "P4ssw0rd” as her password on her online accounts. Why should she change this? Check all that apply.

o Passwords should be used only once.
o It could be easily guessed.
o Passwords must be unique.
o It contains insufficient personal information.
o Passwords should be changed regularly.

Answers

Answer:

it could be easily guessed

All of them except C

Can anybody do Algorithm 2 for me (with Python).
Answer = 25 points.

Answers

Answer:

age=int(input("Enter age"))

if age>=18:

    print("You are Young")

else

   print("You are child")

Explanation:

if you have any query or any problem kindly ask in comment

Who should NOT apply for financial aid?

Students who will attend college part-time

Students whose annual family income is over $100,000

Students who will attend community college

All students should apply for financial aid

Answers

Answer: wealthy students should, not a must, apply for it. Not every student.

If y varies inversely as x, and y =23 when x=8, find y when x=4 .

Answers

I think u just divide y by two cuz the x value was divided by two

How do you write a multiplication formula in excel with an absolute refrence?

Answers

To multiply all the numbers in column A by cell C2, add $ symbols to the cell reference like this: $C$2, which you can see in the example below. Using $ symbols tells Excel that the reference to C2 is “absolute,” so when you copy the formula to another cell, the reference will always be to cell C2.



Horatio would like to use the category functionality contained within Outlook 2016. Which option should he choose to be able to rename categories?

Answers

Answer:

Items that are associated with one another as a group can be categorized by assigning colors to the group for easy identification in Microsoft Outlook

The different colors used includes; Yellow, Blue, Red, Green, Purple, and Orange

in order to rename a category choose the 'All Categories...' option among the options in the Categorize menu, to display the 'Color Categories' dialogue box

Within the 'Color Categories' dialogue box, check the box next to the desired color of the category and select rename

Type in the new name of the Color Category

With the check box next to the Color Category of the items that are currently selected and displayed in outlook, select 'OK' to assign the Color Category to the items

Explanation:

How would you identify the cell located in column
Brow 12?
A. 12B
B. B12
C. B:12
D. 12:B

Answers

Answer:

B. B12

Explanation:

Edge2021

Put the following events from computer history in the order they happened:

Answers

Show us a picture so we can answer

Live Preview, found in the Font group, uses which method for seeing different font sizes without committing to them.
double-clicking the sizes on the Size drop-down list
pointing the mouse pointer to the sizes on the Size drop-down list
right-clicking the cell and clicking Preview Size on the drop-down list
clicking the sizes on the Size drop-down list

Answers

Answer:

B- pointing the mouse pointer to the sizes on the Size drop-down list

Explanation:

Answer:

B

Explanation:

got it right on edge

Why is storage and important part of the computing process? It must be atleast five sentences.

Answers

Your computer needs storage because the processor needs a place to perform its magic — a scratchpad for mad doodles, if you will. All computers need storage. ... Memory is where the processor does its work, where programs run, and where information is stored while it's being worked on.

And why five sentences?

How does segmenting your network increase network security?

Answers

Answer:

By segmenting networks, it becomes easier to protect the most sensitive data that you have on your internally-facing network assets. The creation of a layer of separation between servers containing sensitive data and everything outside of your network can do wonders to reduce your risk of data loss or theft.

Explanation:

PLEASE MARK ME AS BRAINLIEST

Which of the following is NOT true about data?
A. It is information processed or stored by a computer
B. It is stored and processed in decimal format
C. It can be in the form of figures, texts, images or other types of
information
D. It can be transferred from one computer to another

Answers

Answer: B. It is stored and processed in decimal format

============================================================

Explanation:

Choice B is not true because data is stored and processed in binary format. This is in the often talked about format of 1s and 0s. Binary is preferred because computers are built upon electronic circuits. If an electrical current is passing through a certain node, then you can represent this with 1 for "on", while no electricity would be 0 for "off". Think of a series of switches you can flip up or down. Chaining together 1's and 0's allows us to represent pretty much any kind of thing we want from documents, to pictures, to movies to videogames. The 1's and 0's can represent instructions of a program (aka computer code) or it could represent raw data such as an image file.

In short, data is not stored and processed in decimal format. It's represented in binary instead. Binary is base 2 consisting of the digits 0 and 1. In contrast, decimal format deals with the digits 0 through 9.

is it safe for me to use normal glue to stick things on my laptop like stickers or pics?

Answers

Answer:

I think you should be fine, as long as you're just sticking it to the backside of your laptop. (For MacBooks, this is the part of the laptop with the apple symbol.) You can easily wash glue off with a cleaner such as Goo Gone or Pledge. There's better solutions, like ordering a case for your computer and putting the stickers on there, but I guess it's fine to stick them onto your computer. I'll attach a photo of an example of case with stickers.

Hope this helps! Feel free to give me Brainliest if you feel this helped. Have a good day, and feel free to comment any questions below you may have. :)

It is safe to use normal glue to stick things on my laptop like stickers or pics. On the back of the laptop cover, this glue can be used.

What are glues?

Any non-metallic substance applied to one or both sides of two distinct items that binds them together and prevents their separation is an adhesive, also known as glue, cement, mucilage, or paste.

superglue, sometimes called cyanoacrylate, is a kind of adhesive that joins quickly and may be used on a range of surfaces and materials. This fast-bonding glue has the advantage of eliminating the need for nails, clamps, and other fasteners. Superglues are waterproof, quick-setting, and will dry clear.

Therefore, stickers and pictures can be safely adhered on my laptop using regular adhesive. This glue can be applied to the laptop cover's rear.

To learn more about glues, refer to the link:

https://brainly.com/question/13225566

#SPJ2

Other Questions
What do you think would be the biggest challenge of being a woman in the United States in the early 1800s, and why? Which BEST describes Karin's underlyinghopes about performing throat singing inthe future?(I-ready test) Work out 4 1/7 + 1 1/2 A person invested $7,900 in an account growing at a rate allowing the money todouble every 8 years. How much money would be in the account after 5 years, to thenearest dollar?I need answers fast The line passing the points (-2,12) and (3-23) intersects the line passing through which of these pairs of points? Help with physics please! Offering a bunch of points! Order of OperationThe Middle school team scored three field goals worth three points each and two touchdowns worth six points each, Including extra points. Write a numerical Expression to find the team's score. 3a-2a-1) -(-2a-2a+1 PLZ HELP ASAPDoes anyone have any advise on how to make this essay any better iTS LEGIT EASY POINTS XD Kyle ran the race in three and one hundred three thousandths seconds. Which number shows three and one hundred three thousandths in standard form. Hurry! which is the remainder when (x^5-2x^4+3x^3-2x^2+4x-6) is divided by (x+2) Can someone help its easy Meaghan and Lily are dividing 43.61 by 7. Meaghan says that the first digit of the quotient is in the ones place. Lily says it is in the tens place. Who is right? How do you know? Which one is correct A. B. C. D. find the missing side length of similar polygons FOR 40 points!!!! I need the whole page finish !!!!!! Pleaseeeeee!!!!!!! I will five u brainlist !!!!!! Terry rides his bike to work. Ittakes him 40 minutes to go 7miles. What is Terry's rate perhour?(** how many minutes inan hour**) Water (3010 g ) is heated until it just begins to boil. If the water absorbs 5.79x105 J of heat in theprocess, what was the initial temperature of the water? Please help due tonight Tom buys 3 burgers and 5 drinks for $34. Jane buys 2 burgers and 6 drinks for $36. How much is each burger and each drink?