HURRY PLS
polina is a system architect and at the point in her current project where she must review the code at a high level to make sure it meets all the requirements. After that, which of the following groups will polina work with


A) the testing team

b)the CEO

Answers

Answer 1

Answer:

the testing team

Explanation:

because even though she may have fulfilled the requirements but she still need to test if it runs perfectly or not


Related Questions

A(n) _________ Web page displays customized content in response to keyboard or mouse actions or based on information supplied directly or indirectly by the person viewing the page.

Answers

Answer:

dynamic

Explanation:

A dynamic web page serves out varied material to various visitors while keeping the same layout and appearance. These pages, which are often built in AJAX, ASP, or ASP.NET, require longer to render than plain static sites. They are commonly used to display data that updates regularly, such as weather forecast or market prices.

Dynamic web pages often incorporate software applications for various services and need server-side resources such as databases. A database enables the page builder to divide the design of the website from the content that will be presented to users. When they post material to the database, the website retrieves it in response to a user request.

Which utility uses the internet control messaging protocol (icmp)? cisco

Answers

The utility that uses the internet control messaging protocol (icmp) is known as Ping.

What is Ping?

Ping is known to be a kind of utility that makes use of ICMP messages to report back an information on network connectivity and also  data speed often sends between a host and a given computer.

Note that The utility that uses the internet control messaging protocol (icmp) is known as Ping.

Learn more about internet control from

https://brainly.com/question/9257742

#SPJ12

What are 2 ways to send a message to your client when signed in as an accountant user?.

Answers

Answer:

The use of Ask client and request are the two ways to send a message to your client when signed in as an accountant user.

A(n) _____ is a local connection point-of-presence that connects a variety of high-performance networks, and its main function is the exchange of Internet2 (I2) traffic with a specified bandwidth.

Answers

Answer:

GigaPOP

Explanation:

A gigabit point of presence, also known as GigaPOP is a single entry point to Internet2, which is a high-speed IP network managed by institutions and other organizations. Gigabit Points of Presence generally handle data transmission rates of one gigabit per second or more.

you have a windows server 2016 system that you want to use as a dhcp relay agent. which windows server 2016 service would you use to do this?

Answers

You should use Routing and Remote access of the Windows server 2016 service to make the computer system act as a DHCP relay agent.

What is a server?

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

In this scenario, you should use Routing and Remote access of the Windows server 2016 service to make the computer system act as a Dynamic Host Configuration Protocol (DHCP) relay agent.

Read more on Windows server 2016 here: https://brainly.com/question/14584088

#SPJ11

A field identified in a record as holding the unique identifier for that record is called the::

Answers

A field identified in a record as holding the unique identifier for that record is called the; key field

What is a key field in computer?

A field in computer is a record that holds unique data which identifies that record from all the other records in the file or database

Finally, the correct answer is a key field because it is a field in a record of a data table that contains unique data and separates that record from all other records in the database.

Typical key fields include account number, product code and customer name.

Read more about key field at; https://brainly.com/question/14577288

#SPJ12

which of the following is a mathematical function defined in the sql standard?

Answers

A  mathematical function defined in the SQL standard are:

ABSCEILING DEGREES, etc.

What are math functions in SQL?

Arithmetic functions such as ABS, CEILING, radians are known to be often found in SQL standard .

Note that SQL is said to be a query language set up for management of data that is been saved or held in a RDBMS.

A  mathematical function defined in the sql standard are:

ABSCEILING DEGREES, etc.

Learn more about SQL standard from

https://brainly.com/question/9692465

#SPJ11

An accenture sales team is in conversations with a potential client who has expressed interest in ai solutions for their business. what should the sales team emphasize to differentiate accenture's ai capabilities in the marketplace?

Answers

The sales team should emphasize on Accenture's large amount of industry knowledge, experience, and proprietary assets in the AI space.

What is AI?

AI is an abbreviation for Artificial Intelligence and it can be defined as a subfield in computer science that deals with the use of advanced computer algorithms and technology to develop an intelligent,  smart computer-controlled robot with the abilities to proffer solutions to very complex problems.

In this scenario, the sales team should emphasize on Accenture's large amount of industry knowledge, experience, and proprietary assets in the AI space in order to differentiate their AI capabilities in the marketplace.

Read more on Artificial Intelligence here: brainly.com/question/25523571

#SPJ1

how does the va assess the satisfaction of veteran care?

Answers

The VA assess the satisfaction of veteran care by offering them primary care and mental health care.

Who is a veteran?

It should be noted that a veteran simply means an individual that has a long experience in a particular field.

In this case, the VA assess the satisfaction of veteran care by offering them primary care and mental health care.

Learn more about veteran on:

brainly.com/question/303798

#SPJ12

Which term refers to a shorthand method for identifying network and host bits in an ip address?

Answers

A CIDR Notation is known as the term that refers to a shorthand method for identifying network and host bits in an ip address.

What is CIDR Notation?

This is known to be a term that was devised in 1993 by the IETF. The  CIDR is said to be a  shorthand method for knowing network and host bits in an IP address.

Therefore, one can say that A CIDR Notation is known as the term that refers to a shorthand method for identifying network and host bits in an ip address.

Learn more about CIDR Notation from

https://brainly.com/question/14985928

#SPJ12

Privacy principles need to be balanced against the
private information. Select 2 options.
O financial
ethical
O corporate
D societal
political
benefit that comes from the automated collection of

Answers

In the case above about Privacy principles, the balanced needs to be

Societal.

What does privacy mean?

The presence of informational privacy rights implies that people are said to be  under a duty or not to make known information or to hinder unauthorized use of their information by others.

Note that when Privacy principles is balanced against Societal benefit that comes from the automated collection of private information. , the world will be at peace.

Learn more about Privacy principles from

https://brainly.com/question/10524592

#SPJ1

Participating providers contract to participate in a BCBS plan preferred provider network (PPN), which is a program that requires providers to adhere to __________ care provisions. a. managed b. hospital c. prospective d. retrospective

Answers

The contracts participate in the PPN provided by BSBS in order to form the adhere to managed care provisions. Thus, option A is correct.

What is BSBS?

BSBS stands for Blue Cross and Blue Shield, is an organization in United States that provides hospital coverage and the insurance.

The preferred provider network (PPN) are the health care service providers to the claimants in the case of injury caused by the motorcycle accident.

Thereby, it can be stated that the BCBS providers with the PPN forms to adhere providing managed care provision. Hence, option A is correct.

Learn more about Blue Cross and Blue Shield, here:

https://brainly.com/question/6967361

#SPJ1

Which myth of the foundation of the olympian games is prominently displayed on the east pediment of the temple of zeus of olympia?.

Answers

Answer:

This does not belong under the category of Computers and Technology

The myth of the foundation of the olympian games is prominently displayed on the east pediment of the temple of zeus of olympia is that the sculptures shows The Chariot Race of Pelops and Oinomaos.

What is Temple of Zeus?

The ruined Temple of Zeus stands that site of Olympia was built to honor the chief of the gods. It was probably constructed at around 470 B.C when the ancient Olympic Games were at their peak.

The east pediment of the Parthenon showed the birth of goddess Athena from the head of her father Zeus. The sculptures that represented the actual scene are lost. The sculptures represent about the Chariot Race of Pelops and Oinomaos.

The Temple of Olympian Zeus is also known as the Olympion or Columns of the Olympian Zeus, is a former colossal temple at the center of the Greek capital Athens.

In the center of the sculpture stands Zeus watching over Pelops to the right and Oenomaus to the left. Beside them are two female figures, followed by the chariots about to be raced on.

Learn more about Olympia here:

https://brainly.com/question/858693

#SPJ2

ZipCar uses cutting edge wireless technology combined with sophisticated data management and security techniques to assure that its promises of spur-of-the-moment car sharing is ________, streamlined, and safe.

Answers

Answer:

dependable

Explanation:

Outline the steps for logging into E-mail account​

Answers

Answer:

go to your email service provider, type in your username(email) and password click the log in or sign in button to continue

What is the official name of an application on a desktop or a laptop?.

Answers

Answer:

the official name of an application on a desktop is desktop application

what are the two different types of dns requests?

Answers

Answer:

Recursive Query - When a DNS Client submits a Query to a DNS Server for name resolution. The response to the DNS Query might be either an answer to the query or an error message. In Recursive Query, if the DNS Server does not have the reply to offer an exact response to the DNS Client, the DNS Server may query other DNS Servers on behalf of the DNS Client.Iterative Query - When a DNS Client requests name resolution from the DNS server, the DNS Server returns the best reply it has. If the DNS Server does not recognize the response to the Client's DNS Query, the answer might also be a referral to another lower level DNS Server. This lower level DNS Server is designated by the higher level DNS Server as the Authoritative DNS Server for the DNS namespace with which the DNS Query is associated. Once the DNS Client receives the referral from the higher level DNS server, it may send a DNS query to the lower level DNS server that received the recommendation.

The two major types of DNS request are as follows;

Recursive Query Iterative Query

What is a domain name system?

Domain name system is abbreviated as DNS.

A Domain Name System (DNS) converts domain names into IP addresses, which allow browsers to get to websites and other internet resources.

Basically,  DNS is a directory of names that match with numbers.

Computer uses IP addresses to communicate, therefore, the DNS convert domain names to IP address for communication.  

The two major types of DNS request are as follows;

Recursive Query - Query that demands a resolution Iterative Query - Query that does not demand a resolution.

learn more on DNS here: https://brainly.com/question/14397200

#SPJ11

is it possible to use this cpu with mb still even with the warning?

Answers

The problem with the incompatibility of the CPU with the motherboard cannot be solving without the update.

What is Ryzen 9 5950X ?

It is a gaming CPU that is able to perform the multithread operations. The compatibility of CPU with the motherboard will form the type of socket supported by between the CPU and motherboard.

The updating of BIOS version made the compatibility of the software with the computer module. However the incompatibility of the motherboard with the CPU can not be corrected without the change in the BIOS update to establish the communication.

Learn more about motherboard, here:

https://brainly.com/question/14511803

#SPJ1

What is the primary added value of relational databases over flat files?

Answers

The primary added value (advantage) of relational databases over flat files is an ability of the system to quickly scan large amounts of data.

What is a relational database?

A relational database can be defined as a type of database that is designed and developed to store, structure and recognize relation that are existing between data points and items of information.

In database management system (DBMS), an ability of the system to quickly scan large amounts of data is the primary added value (advantage) of relational databases over flat files.

Read more on database here: brainly.com/question/13179611

#SPJ12

8. When “arc rated” clothing is worn it must allow for what

Answers

When "arc rated" clothing is worn by a worker it must allow for movement and visibility.

What is an arc rated" clothing?

An arc rated" clothing can be defined as a type of personal protective equipment (PPE) that is worn by a worker, so as to protect him or her from arc flash injuries when working on energized equipment and de-energizing equipment.

According to the Occupational Safety and Health Administration (OSHA), when "arc rated" clothing is worn by a worker it must allow for movement and visibility.

Read more on OSHA here: brainly.com/question/17199752

#SPJ1

what are some examples of security goals that you may have for an organization? check all that apply.

Answers

An examples of security goals that you may have for an organization is:  

To protect customer data against unauthorized access.

What is customer credentials about?

The goal of a firm in terms of security is to Safeguards or Defend customer credentials or details.

Therefore, An examples of security goals that you may have for an organization is:  

To protect customer data against unauthorized access.

Learn more about security goals from

https://brainly.com/question/14139033

#SPJ11

Once the system is appropriately built, secured, and deployed, the process of maintaining security is ________.

Answers

Once a computer system is appropriately built, secured, and deployed, the process of maintaining security is continuous.

What is information security?

Information security is a preventive practice that is used to protect an information system (IS) or computer system from potential theft, attack, damage, or unauthorized access, especially through the use of a body of processes and technology.

As a general rule, once a computer system is appropriately built, secured, and deployed, the process of maintaining security is continuous.

Read more on information security here: brainly.com/question/14286078

#SPJ12

you are troubleshooting physical layer issues with the gi0/1 interface in a router. you need to view and analyze the number of collisions detected on the interface. which command should you use?

Answers

A command which you should use to view and analyze the number of collisions is show interfaces gi0/1.

What is a command?

A command is the set of instructions that is used to configure a network device such as a router, in order to make it active on a computer network and enable it perform certain tasks automatically during network communication.

In this scenario, show interfaces gi0/1 is a command which you should use to view and analyze the number of collisions.

Read more on commands here: brainly.com/question/17147683

#SPJ11

what methods could you use to set up printing in an organization?

Answers

The methods could you use to set up printing in an organization?

One can connect directly to a printer.One can set up a print server.One can use cloud service to set up printers.

What is the aim of printing?

Printing is the act of reproducing text and images  in a lot of quantities through the use of a master form or template.

Therefore, The methods could you use to set up printing in an organization?

One can connect directly to a printer.One can set up a print server.One can use cloud service to set up printers.

Learn more about printing from

https://brainly.com/question/145385

#SP11

Three symptoms of hacking

Answers

Answer:

1. You receive mass emails

2. Your internet searches get redirected

3. Your passwords are not working

Explanation:

Hope it helps

The quickbooks online advanced desktop app can be installed on which operating system?.

Answers

The quickbooks online advanced desktop app can be installed on Windows PC: Windows 10 operating system.

What is this about?

The quickbooks online advanced desktop app can be installed on Windows PC: Windows 10 operating system especially Windows 10, and whose specification is Intel Core i5 that has at least 4 GB of RAM.

Note that a person needs Adobe Reader 11.0 or higher to nbe able to print forms or the use of  Mac: OS X "High Sierra" 10.13 or newer.

Learn more about quickbooks  from

https://brainly.com/question/24441347

#SPJ1

The quickbooks online advanced desktop app can be installed on which operating system?.

Answers

Explanation:

For Android products, your device will need to be running Nougat 7.1. 1 or newer.

True or false: traditional iq on its own is fine for technical work

Answers

Traditional iq on its own is fine for technical work. Therefore, it's true.

How to depict the information?

It should be noted that traditional IQ is used for technical work as a person moves into a higher management role.

This implies that the ability to lead and manage becomes important and can be relied on technical skills.

Learn more about technical on:

brainly.com/question/1304551

#SPJ12

Which two choices are examples of trivial file transfer protocol (tftp) use? (choose two. )

Answers

The two examples of trivial file transfer protocol (TFTP) use are:

Download router upgrades.Software upgrades to IP telephones.

What is trivial file transfer protocol (TFTP)?

Trivial file transfer protocol (TFTP) can be defined as a simple lockstep protocol which is designed and developed to avail an end user an ability to receive a file or place a file onto a remote host.

In Computer networking, the two examples of trivial file transfer protocol (TFTP) use include the following:

Download router upgrades.Software upgrades to IP telephones.

Read more on FTP here: brainly.com/question/20602197

#SPJ12

Assume the int variables i, lo, hi, and result have been declared and that lo and hi have been initialized. Write a for loop that adds the integers between lo and hi (inclusive), and stores the result in result. Your code should not change the values of lo and hi. Also, do not declare any additional variables -- use only i, lo, hi, and result. 1 Enter your code

Answers

The loop will be:

int lo, hi, result;

result = 0;

//the loop will be as follows:

for(i = lo; i <= hi; i++)

{

result = i++;

}

What is a loop?

A loop is a sequence of instruction s that is continually repeated until a certain condition is reached.

The above loop means that the integer (i) will start from the value of lo, and stop when the value of i is equal to hi

Learn more about loop on:

https://brainly.com/question/26568485

#SPJ12

Other Questions
if someone ask you to write the tens in 1,567 would you write 67 or 6 if someone asks you to write the tens in 145,677 would you write 77 or 7if someone asks you to write the hundredths in 146,888would you write 688 or 8 or 888?? explain pls During prerace, an athlete who weighs 70 kg would need between _____ and _____ g of carbohydrate daily. Qu oracin es impersonal?Naden en el lago si quieren.Se puede nadar en este lago.Las autoridades permiten nadar en este lago.Se renen para nadar en el lago. Use the formula A=bxh to find the base of a parallelogram if the area is 228 cm and the height is 12 cm.O aObOOd19 cm1.9 cm19 cm 2none of the above As fully as you can, explain what ishmael means by "mother culture," and "her" relationship to us as individuals The Islamic prohibition against idols led to the use of which of the following elements in art? stylized floral flourishes (arabesques)calligraphyAll of the choices are correct.geometric patterns FalseQuestion 2 (1 point)A system of government in which the people elect representatives to represent th Which philosopher maintained that knowledge comes from experience via the senses, and therefore, science should rely on observations and experiments? A.SocratesB.PlatoC.John LockeD.Hippocrates Chemistry: Please make sure to answer each question. Thank you in advance.Create a diagram of your electroplating apparatus (an electrolytic cell). Then submit your drawing with the following terms labeled correctly. Or, beginning with the positive terminal of the battery and ending with the negative terminal of the battery, describe the path that the electricity takes and where each of the following occurs: anodecathodecopper stripbatterypositive terminalnegative terminalplace where oxidation occursplace where reduction occurselectrolyte solutioncoin (or nail)direction of electron flowAnswer:(Score for Question 2: ___ of 7 points)Describe the results of your procedure with the coin. Answer:(Score for Question 1: ___ of 6 points)Write the two half-reactions that occur in this electroplating process. Be sure to include the states of the elements or ions.Answer: The equation of a circle is x + y-6y+1=0. What are the coordinates ofthe center and the length of the radius of this circle?(1) center (0,3) and radius 22(2) center (0,-3) and radius 22(3) center (0.6) and radius 35(4) center (0,-6) and radius 35 which risk factor is+most likely to be encountered in a workplace? Explain the process of Protein Synthesis Where is the rug? (1 point)a Est dentro del silln.b Est debajo del silln.c Est sobre la lmpara.d Est detrs de la lmpara. What are the defining characteristics of ray-finned fishes? Tommy wishes to determine the return on two stocks she owned in 2019. At the beginning of the year, stock X traded for $81per share. During the year, X paid dividends of $5 At the end of the year, Xstock was worth $72 Calculate the annual rate of return, r, for X (Enter the answer in % format without % sign -> 20.51 and not 20.51% or 0.2051) A standard marathon is about 26.2 miles.How many feet is this equivalent to?a.)2400 feetb.)420,455 feetc.)138,336 feetd.)5280 feet Question 1 of 20The volume of a rectangular box is 5x(x+3)(2x - 1).Height: 2x-1Length: x + 3Width: 5xWhich statement is true?A. The volume is the product of the area of the base, 5x(x + 3), andthe height, 2x - 1.B. The volume is the sum of the length, x + 3, the width, 5x, and theheight, 2x - 1.C. The volume is the product of the length, x + 3, and the width, 5x.D. The volume does not depend on the height, 2x - 1. what is the full form of UNICEF please put the answer letter by the number :) A charge of 5.67 x 10^-18 C is placed 3.5 x 10^-6 m away from another charge of -3.79 x 10^-19 C. What is the force of attraction between them?