Stages of reverse engineering

Answers

Answer 1

Answer:

Capture Data, Refine the Model, and then Manufacture it.

Explanation:


Related Questions

Create a mobile app plan using PowerPoint slides to show mock-ups of screens, identifying input, process, and output for each
screen,

Answers

Answer:

PowerPoint slides to show mock ups

what are the outputs of these please help

Answers

Answer:

monkey know monkey not tell

Explanation:

Answer:

it will ask for a number.

if that number < or = to 0

then

it will add three to that number.

if that is not true

and that number > 0 and that number < 5

than

it will add one to that number.

if none of those are true

than

it will subtract 5 to that number.

Explanation:

What is the purpose of using a tripod when filming?

Answers

Answer:

It helps with the camera  movement to get different angles and directions. Sometimes to keep it safe from falling out of grasp.

Explanation:

Answer:

it steadys the camera and can hold it in place for accurate shots.

Explanation:

Ryan is applying a sort to the data in a table that you have inserted in Word. Which option is important for most tables that have column headings?
• Sort in descending order.
• Sort in ascending order.
• Select the option "My List has Header Row."
• Choose the correct sort field.

Answers

Ryan is applying a sort to the data in a table that you have inserted in Word.By Choose the correct sort field option is important for most tables that have column headings.

What is statistics?

A statistics desk is a number cell wherein you may alternate values in a number of the cells and give you one-of-a-kind solutions to a problem. An appropriate instance of a statistics desk employs the PMT feature with one-of-a-kind mortgage quantities and hobby fees to calculate the low-priced quantity on a domestic loan you can set up in descending, or you may set up in ascending.

And D, has not have anything to do with this requirement. You do not have this feature to be had with you. Select the option, "My listing has header row" isn't always to be had to us. And clearly, you want to pick out the excellent type of discipline first. And then you may set up or type accordingly.

Read more about the column headings:

https://brainly.com/question/1788884

#SPJ2

Which file organisation has the quickest access to data files? *

1 point

a)Direct

b)Serial

c)Sequential

d)Transaction​

Answers

A direct have the quickest access to data files

Which of the following statements is true regarding the technical issues for developing applications for global audiences? Select 3 options.

Content delivery networks prevent traffic surges and can offset slow local internet service.

You should base your choice of which operating system to develop on usage rates in that specific market

Most users now have stable, fast connections worldwide.

A content delivery network can provide quick access to your content, no matter where your users live.

You should consider limiting the number of large images or audio files that you include, depending on the target market.

Answers

Answer:

Explanation:

From the available options presented, when developing for a global audience the following are true...

Content delivery networks prevent traffic surges and can offset slow local internet service.

A content delivery network can provide quick access to your content, no matter where your users live.

You should consider limiting the number of large images or audio files that you include, depending on the target market.

For global applications content delivery networks are a must since they allow the end-user to access the web page and its high quality content as if the web server were close by. By reducing the distance between the server and the end-user through these networks, you are effectively reducing latency, load times, performance, traffic surge effects, etc. Also when developing for a worldwide audience you should limit the number of larger images and audio files to only show the necessary ones for each target region, in order to make performance much more stable.

Complete the sentence.
A beta version of software is released during the _______ phase of software development.

Teseting

Release

Coding

Design

Answers

Hi Bro... , You Have A Wonderful Questions.

IF WE DIRECTLY JUMP RIGHT ON THE ANSWER , THEN THE SENTENCE WILL BE :

A Beta Version Of Software Is Released During The "Testing" Phase Of Software Development.

Explaination :

A Version Of A Piece Of Software That Is Made Available For Testing, Typically By A Limited Number Of Users Outside The Company That Is Developing It, Before Its General Release Is Called Beta Version.

As Mentioned Here , We Can See That Beta Version Is Made For Testing Purpose, To Test Whether It Working Properly Or Not.

Hope This Answer Satisfied You ^_^

And Thanks For The Points ;-)

A beta version of software is released during the Testing phase of software development.

What does having a beta version mean?

A pre-release of software that is given out to a large group of users to try under real conditions. Beta versions have gone through alpha testing in-house and are generally fairly close in look, feel and function to the final product; however, design changes often occur as a result.

What is alpha and beta version?

A beta test is carried out following acceptance testing at the supplier's site (alpha test) and immediately before the general release of the software as a product. In general an alpha version or release of a software package intends to do something particular, mostly does so, yet isn't guaranteed to do so fully.

To learn more about A beta version, refer

https://brainly.com/question/23441836

#SPJ2

I’ll mark brainliest if correct

Select the correct answer.
Andy, a developer, is designing a new program. Which tool should Andy use to help him complete his task?

A. SQL-Integrity Check

B.Unified Modeling Language

C.Selenium

D.Perforce

Answers

Answer:

I believe the answer is B

Explanation:

Which of the following is something that would NOT appear in the Reviewing pane?
a. The date on which a specific insertion was made.
b. The length of the document being reviewed.
c. The name of the person making an insertion.
d. The total number of revisions made to the document.

Answers

Answer:

A

Explanation:

What type of address uses a number that uniquely identifies each computer?
O Computer address
O Home address
O E-mail address
O IP address​

Answers

Answer:

The awnser is D or IP Address

Explanation:

BRAINLIEST PLEASE

Answer:

IP Address. This is the most unique as you can track computers down with this code too. I hope you found this helpful, you are very welcome!

Opportunity and Spirit, NASA's Mars Exploration Rovers, were the first scientific instruments able to collect samples directly from the surface of Mars. One of the mission's goals was to determine the likelihood that life ever existed on Mars. How were Spirit and Opportunity best able to supply evidence that in the distant past Mars may have had an environment favorable to life?

Answers

Answer:

The rovers sent images of cross beds, centimeter-scale areas in rock layers, that could indicate whether water once flowed on Mars.

Explanation:

HELP ASAP!Select all examples of desirable workplace skills, habits, and attitudes.

waits for others to solve problems
does not call in sick or miss work frequently
creates a list of solutions for the boss
arrives at work on time or early
waits for supervisor to give directions
works quickly and accurately
shows initiative
communicates effectively
sets clear goals to achieve success
gives products to friends for free

Answers

Answer:

does not call in sick or miss work frequently

creates a list of solutions for the boss

arrives at work on time or early

waits for supervisor to give directions

works quickly and accurately

shows initiative

communicates effectively

sets clear goals to achieve success

Explanation:

Have a Great Day!!!

10 points each!!!
Which option can be inferred from the following scenario?

You come home from work on a summer afternoon and notice your home is warmer than usual. You check the thermostat. The room temperature is set at 78°F, so the house should seem cooler. You lower the temperature on the thermostat several degrees in order for the air conditioner to work.


The temperature on the thermostat should be set lower than 78°F.

The air conditioner is not functioning properly.

The air conditioner was turned off.

The thermostat is faulty and may need calibration.

Answers

Answer:

Option D

Explanation:

78 degree Fahrenheit is a below normal temperature during summer. Now if the room temperature is set a 78 degree Fahrenheit, then one must not feel that the room is warmer than usual.

Hence, there can be some issue with the thermostat. Hence, thermostat needs calibration as it is not working properly.

Option D.

Answer:

d

Explanation:

You come home from work on a summer afternoon and notice your home is warmer than usual. You check the thermostat. The room temperature is set at 78°F, so the house should seem cooler. You lower the temperature on the thermostat several degrees in order for the air conditioner to work so you should calibrate it

What programs are always running when your computer is turned on? Enter the names of the programs in the space provided. Click the Submit button when you are finished to view the suggested response.

Answers

Answer:

open your task manager

Explanation

right click the toolbar below and click on task manager and you will see what programs are running on your pc

Answer:

Items commonly found in the system tray include antivirus settings; battery status; and volume. Sometimes e-mail programs, printers, or faxes are also present. Your computer may have other items in the system tray too.

Explanation:

I just took  a test on edguenity and that was the correct answer hope this helps

Which audio media can be directly sent to the subscribers through an RSS feed?
A.
online streaming
B.
podcast
C.
cloud file
D.
live playback
E.
broadcast

Answers

I believe it’s c sorry if I’m incorrect though

Answer:

The correct answer should be B. podcast

Explanation:

there is a website called RSS feed that is podcasts

What is a bounding box

Answers

Answer:

bounding or enclosing box for a point set in N dimensions is the box with the smallest measure within which all the points lie.

1. Which of the following commands allows the user to move objects around a basepoint?
Rotate
Fillet
Stretch
Extend

Answers

Answer:

Rotate

Explanation:

It seems that we are talking about AutoCAD software in this question. Normally to move an object you would use the Move command which allows you to move the object normally. However, since in the question we are talking about moving the object "around" a basepoint this would be the Rotate command. This is simply because it simply allows you to select the basepoint and move the object only in a 360 degrees rotation around the basepoint itself, where the basepoint acts as the center point.

Many applications ask, "Why did you leave your previous position?" Choose the best answer out of the examples below.

Answers

We can't see the examples therefore we can't help you try asking the question again with a picture of the examples

When creating a storyboard, in which section do you mention how you move from one shot to the next?
A.
synopsis
B.
sketch
C.
transitions
D.
shot description
E.
shot sequence number

Answers

Answer: C

Explanation:

Answer:

E. shot sequence number

Explanation:

This isn't academic, but what do I do if HI-REZ won't let me sign into an existing account. “Something went wrong” keeps popping up when I type in the correct info

Answers

Answer:

contact their support

Explanation:

the advantages and disadvantages of internet​

Answers

Advantages : a lot of useful information from all around the world
Disadvantage:, cyberbullying, stalking, hacking

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks? a. Use mail merge for steps 1 and 2 and a word processor for step 3. b. Use a graphics software for step 1, mail merge for step 2, and a word processor for step 3. c. Use a word processor for steps 1 and 2 and a graphics software for step 3. d. Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.

Answers

Answer:

1: Word Processor

2: Graphics Software

3: Mail Merge

Explanation:

Given

1. Create a list of invitees

2. Design an invitation card

3. Personalize the card

Creating a list of invitees is a task that requires basic activities such as typing, using of numbers and bullets; these activities can be achieved using word processing software programs such as Microsoft Word, WordPerfect, amongst others.

So task 1 requires a word processor

An invitation card is a piece of graphics that can be perfectly handled by graphics software programs such as CorelDraw, Adobe Photoshop, etc.

So task 1 requires a graphics software

Task 3 can be achieved using mail merge and this is because mail merge can be used either to print or to mail recipients. While mailing the recipients, one can easily personalize each letter (or in this case, an invitation card) to suit the recipient it is being directed to.

Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to ping multiple IP addresses simultaneously and is usually included in Kali Linux - Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets - The original utility from which OpenVas was developed - A port state which does not allow entry or access to a service - An open-source fork of Nessus - A port state that may indicate a firewall is being used to allow specified traffic into or out of the network - A port state that allows access to applications and can be vulnerable - Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly - Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts

Answers

Answer:

1. Nmap.

2. Fping.

3. Hping.

4. Nessus.

5. Closed port.

6. OpenVAS.

7. Filtered port.

8. Open port.

9. Port scanning.

10. Ping sweep.

Explanation:

An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are;

1. Local (internal) IP address.

2. Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are;

I. Internet protocol version 4 (IPv4): this is the first and original version of the internet protocol which was introduced in 1983 using the Advanced Research Projects Agency Network (ARPANET). An example of an IPv4 address is 192.168.1.0.

II. Internet protocol version 6 (IPv6): it is the modified (latest) version of the IPv4 address system and as such can accommodate more addresses or nodes. An example of an IPv6 is 2001:db8:1234:1:0:567:8:1.

ICMP is an acronym for Internet Control Message Protocol and it is a standard protocol for communicating network errors in the form of messages such as Time exceeded and Destination unreachable.

In Computer Networking, an echo reply and echo request are implemented with a command utility referred to as ping. When a user sends an echo request message with the ping program, a successful attempt will return an echo reply message.

1. Nmap: a popular port scanners that has the ability to use a graphical user interface (GUI) front end.

2. Fping: allows you to ping multiple internet protocol (IP) addresses simultaneously and is usually included in Kali Linux.

3. Hping: tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets.

4. Nessus: the original utility from which OpenVas was developed.

5. Closed port: a port state which does not allow entry or access to a service.

6. OpenVAS: an open-source fork of Nessus.

7. Filtered port: a port state that may indicate a firewall is being used to allow specified traffic into or out of the network.

8. Open port: a port state that allows access to applications and can be vulnerable.

9. Port scanning: allows you the ability to scan thousands or even tens of thousands of internet protocol (IP) addresses quickly.

10. Ping sweep: performed by port scanners to scan large networks to identify which internet protocol (IP) addresses belong to active hosts.

HELP GIVING 20 POINTS IF RIGHT

Answers

Answer:

Negative space im pretty sure

Explanation:

negative space is the answer because there is nothing presented in the area.

I NEED THIS NOW!! :((

Which feature of a database allows a user to locate a specific record using keywords?

Chart
Filter
Search
Sort

Answers

which feature of a database allows a user to locate a specific record using keywords?

search

Janet is working on a highly confidential company budget spreadsheet, and she needs to prevent anyone, including administrators in the IT department, from being able to open the file and view its contents.
What should she do?

A) Use the Home tab, select Protect Sheet, and enter a password to prevent access to the sheet.
B) Click the Info tab in the Backstage view, select Protect Workbook, select Encrypt with Password, and enter a password.
C) Click the Review tab, select Protect Workbook, and enter a password for protecting the sheet.
D) Click the View tab and customize the view to protect the sheet from unauthorized users.

Answers

It has to be I took it

What would be the result after the following code is executed? int[] numbers = {40, 3, 5, 7, 8, 12, 10}; int value = numbers[0]; for (int i = 1; i < numbers.length; i++) { if (numbers[i] < value) value = numbers[i]; } The value variable will contain the highest value in the numbers array. The value variable will contain the sum of all the values in the numbers array. The value variable will contain the average of all the values in the numbers array. The value variable will contain the lowest value in the numbers array.

Answers

Answer:

The value variable will contain the lowest value in the numbers array.

Explanation:

Given

The given code segment

Required

The result of the code when executed

The illustration of the code is to determine the smallest of the array.

This is shown below

First, the value variable is initialized to the first index element

int value = numbers[0];

This iterates through the elements of the array starting from the second

 for (int i = 1; i < numbers.length; i++) {

This checks if current element is less than value.

     if (numbers[i] < value)

If yes, value is set to numbers[i]; which is smaller than value

value = numbers[i];

Hence, the end result will save the smallest in value

Need the answer ASAP!! No links I’ll report

Select the correct answer.
Derek works in the software quality assurance department. Which tools or process should Derek use to monitor and measure changes?

A.software engineering process

B.software quality metrics

C.SQA audits

D.reviews

Answers

Answer:

C

Explanation:

Complete the sentence.
You might create algorithms and flowcharts during the ______ phase of software development.

Release

Planning

Design

Coding

Answers

You might create algorithms and flowcharts during the Design phase of software development.

What is the algorithms  about?

In software development, the Design phase is a crucial step in which the developers plan and determine how the software will be built. This involves breaking down the requirements and specifications into smaller, manageable components and then figuring out how these components will work together.

Therefore, to accomplish this, developers often create diagrams, such as flowcharts or algorithms, to help visualize the software's logic and structure. These diagrams can then be used to guide the development of the software, ensuring that all parts of the project are aligned and working towards the same goals.

Learn more about algorithms from

https://brainly.com/question/20543449

#SPJ1

Define the term, external hard drive. Explain why you would use an external hard drive instead of a second internal hard drive.

Answers

Answer:

An external hard drive is a storage device located outside of a computer that is connected through a USB cable or wireless connection. An external hard drive is usually used to store media that a user needs to be portable, for backups, and when the internal drive of the computer is already at its full memory capacity.

Explanation:

External hard drives are usually portable thats why  it is commonly used!

Other Questions
How does social participation differ from politics?Social participation is not very important.Social participation is socializing with friends and not helping anyone.Social participation does not seek to change laws, policies, or government.Social participation cannot be done in public and must be in private. L'istesso tempo means(A) slightly less tempo(B) more lively(C) the length of the beat remains the same(D) with increasing tempo An object moves in simple harmonic motion with amplitude 15m and period 4 minutes. At time t=0 minutes, its displacement from rest is , and initially it moves in a negative direction. Give the equation modeling the displacement d as a function of time t Which device uses electricity to produce a rotational motion? A computer C magnet B generator D motor What is the history of the dream smp to the start to curently NEED ANSWERS FAST!!! If there are 17 blue and white stripes on the flag and 9 of them are blue, how many are white? Which of the followingstatements is correct?A. Matter flows one way, but energy cycles in anecosystem.B. Matter cycles in an ecosystem, but energyflows into, and eventually exits, an ecosystem.C. Matter and energy can flow and cycle in anecosystem, depending on the temperature,D. Neither matter nor energy cycle in anecosystem Please help ASAP!! Its due tomorrow please!! quiennzmamamsmmsmsmsmssnzns Find a:c and a:b:c of the following b) a:b = 4:5,b:C = 3:5 Q23. Look at the image cuales son los 2 generos dramticos fundamentales ? sin link Questlon 5 of 10Which of these will make a risky situation even more dangerous for a teen?A. Parental presenceB. DaytimeC. Having a phoneD. Alcohol use Find the surface area of the triangular prisms below. Principal, $3000; Annual interest rate, 5.4%; time, 5 years why you shouldn't travel during the pandemic ( explain in long answers ) You are exploring a small moon of a distant planet. Measurements indicate that this moon is a sphere of uniform density rho = 5000 kg/m3. You dig a very deep hole into the moon that reaches within r0 = 1000 m of the center of the moon. With your spacesuit, you have a mass of m = 85 kg. Find the force of gravity on you when you stand at the bottom of the hole. PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!!PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!Why is conflict important to a story? Why is it important to be able to identify the antagonist and type of conflict? Response should be 3-5 sentences in length. Diamond Company has three product lines, A, B, and C. The following financial information is available:Item Product Line A Product Line B Product Line CSales $30,000 $45,000 $12,000Variable costs $18,000 $24,000 $7,500Contribution margin $12,000 $21,000 $4,500Fixed costs: Avoidable $4,500 $9,000 $3,000 Unavoidable $3,000 $4,500 $2,000Operating income $4,500 $7,500 ($500)Assuming that Product Line C is discontinued and the manufacturing space formerly devoted to this line is rented for $6,000 per year, operating income for the company will likely:____________.a. Increase by $7,200.b. Increase by $3,300.c. Increase by some other amount.d. Be unchangedthe two effects cancel each other out.e. Increase by $4,500. please help me please please help me every thing due tomorrow 1, What are the three steps of the composition process?2. What is a triad chord?3. How do we create musical texture?4. What three questions can you ask yourself to find out how you want the music you compose to sound?5. What is the V Chord?please help me every thing is due tomorrow please help