What software quality metrics would you use to measure software maintainability, how would you use them, and where in the project life cycle would you use them

Answers

Answer 1

Answer:

V is the average Halstead Volume per module.

G is the average Cyclomatic Complexity per module.

L is the average number of Source Lines of Code (SLOC) per module.

C is the average number of comment lines per module

Explanation:


Related Questions

What rough outline of a policy would you establish to determine who should be allowed to have administrative rights on a computer system with role-based access control? Remember, policies can refer to specific workstations, employee types, customer types, etc. Defend the major tenets of your policy.

Answers

RBAC, also referred to as rule-based access control, is the most popular type of access control system. RBAC is not only in high demand among households, but it has also grown in popularity in the business sphere.

What are households?

In addition to any unrelated individuals who share a residence with related family members, a household may also contain lodgers, foster children, wards, or employees. Families, blended families, shared housing, group homes, boarding houses, houses of multiple occupancies (UK), and single-room occupancy are some examples of household types (US).

Also referred to as rule-based access control, is the most popular type of access control system. RBAC is not only in high demand among households, but it has also grown in popularity in the business sphere. Access control can be configured with conditions, roles, and a script that determines whether the 'answer' variable is true or false.

Therefore, RBAC is not only in high demand among households, but it has also grown in popularity in the business sphere.

Learn more about households here:

https://brainly.com/question/29351418

#SPJ1

Placing parenthesis around a word, in a search, provides an exact match to that word
in the results.

True

False

Answers

Answer:

Explanation:

Placing parenthesis around a word, in a search, provides an exact match to that word in the results.

True

what utility, as a centos system administrator, are you most likely to use to monitor process activity in real time?

Answers

The top command gives a thorough breakdown of the system's processes and their resource utilization, including CPU and memory usage, in real time.

What programme can a Linux system administrator use to modify text documents that contain configuration files?

Vim and nano are the two command-line text editors available in Linux®. If you ever need to write a script, modify a configuration file, build a virtual host, or just make a short note for yourself, you can utilise one of these two alternatives.

When keeping an eye on your machine, have you noticed a continuously high CPU usage statistic of above 90%?

However, if the percentage of privileged time is routinely higher than 90%, the computer's antivirus programme, other drivers, or another OS component may be the cause of the excessive CPU consumption. To determine what is causing this behaviour, you should evaluate it with your system administrator.

to know more about centos system here:

brainly.com/question/14103627

#SPJ1

Write a program to input the day of a week and print holiday if it is Saturday

Answers

DAY=int(input(“Please enter the number of day: ”))
if DAY==1:
… print(“The day is Monday and a working day”)
…elif DAY==2:
… print(“The day is Tuesday and a working day”)
…elif DAY==3:
… print(“The day is Wednesday and a working day”)
…elif DAY==4:
… print(“The day is Thursday and a working day”)
…elif DAY==5:
… print(“The day is Friday and a working day”)
…elif DAY==6:
… print(“The day is Saturday and a holiday”)
…elif DAY==7:
… print(“The day is Sunday and a working day”)
…else:
… print(“Invalid number”)

Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. Please select the best answer from the choices provided T F

Answers

Answer:

Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. False- most teachers use the textbooks as guides. Visiting the library to seek books on your current topic will not help you in determining what to study.

Explanation:

Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. False- most teachers use the textbooks as guides. Visiting the library to seek books on your current topic will not help you in determining what to study.

Answer:

False

Explanation: I took the test and passed!!

The Internet is considered a WAN.

True or False

Answers

Answer:

True

Explanation:

The Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and individuals for almost any purpose imaginable.

Answer:

True

The internet is considered a WAN

What is the IT professional testing?
fault tolerance
spoolers
shared resources
routing protocols

Answers

Answer:

The answer would be Fault Tolerance.

Explanation: Hope this helps<3

what is pirating means in technical terms?​

Answers

Answer:

the illegal copying, distribution or use of software

Pirating refers to the unauthorized copying, distribution, or use of copyrighted material, such as software, music, movies, or books, without the permission of the copyright holder.

Here,

In technical terms pirating refers to the unauthorized copying, distribution, or use of copyrighted material.

This can include activities such as downloading or sharing copyrighted content without paying for it or using cracks to bypass licensing or copy protection mechanisms.

Pirating is considered illegal and unethical because it infringes upon the rights of the copyright holder and can result in legal consequences.

Know more about pirating,

https://brainly.com/question/29769277

#SPJ6

which adobe program is used for typesetting and interior page layout

Answers

Answer:

Adobe InDesign

Explanation:

An ad agency is interested in keeping track of their clients a little more easily. Help them out by creating two ArrayLists :


1. Create an ArrayList called company Name that stores an ArrayList of all the company names.


2. Create an Integer ArrayList called contractValue that stores the value of the contract that the ad agency has with its clients.

Answers

Answer:

Explanation:

The only things requested in this question were the two Arraylists. These following arraylists need to be called and values need to be added to them by the corresponding code. At the moment they would be empty.

1.         ArrayList<String> Names = new ArrayList<>();

2.        ArrayList<Integer> contractValue = new ArrayList<>();

They can be added to any code or in the main method as long as they are within the scope of the code that will be calling them.

G
Which type of control uses a Boolean value to control the number of looping increments?
flag
sentinel
EOF
O count
3
Mark this and return
Save and Exit
Next
01:53:
Submit

Answers

The type of control that uses a Boolean value to control the number of looping increments is a flag loop. The correct option is a.

What is a flag loop?

To act as a flag, a bool variable is created and initialized. The while loop runs until the value of the flag variable changes (true becomes false or false becomes true).

The user is requested to input integers on the keyboard that is added together in the example that follows.

You can modify a program's control flow and choose which statement(s) will be executed using boolean expressions when using boolean control structures.

Therefore, the correct option is a. flag loop.

To learn more about Boolean value, refer to the link:

https://brainly.com/question/29096400

#SPJ9

The museum ticket price should be :
$0 on Fridays with couponcode "FREEFRIDAY"
$10 on the weekends for everybody
On weekdays $5 for 18 years old and under and $10 otherwise.
A student wrote this conditional to set the price . For which case will the price NOT come out as indicated?

var price=10;

// Check the value of variables to decide the price to set

if (age <= 18 && day != "Saturday" && day != "Sunday") {
price = price / 2;
} else if (day == "Friday" && discountCode == "FREEFRIDAY"){
price = 0;
}

a. a minor on Friday with the discount code
b. an adult on Friday with the discount code
c. an adult on the weekend
d. a minor on the weekend
e. an adult on a weekday

Answers

Answer:

a. a minor on Friday with the discount code

Explanation:

Let's try and decipher the given code segment

Let's first look at the if part

if (age <= 18 && day != "Saturday" && day != "Sunday") {

              price = price / 2;

==> if a minor and a weekend then price is half = $5

Now look at the else part

else if (day == "Friday" && discountCode == "FREEFRIDAY"){

             price = 0;

}

This means if the visitor is NOT a minor and it is NOT a weekend if it is a friday, with a coupon then admission is free

Let's look at the answer choices and see what the logic flow is:

a. minor on Friday with the discount code
if (age <= 18 && day != "Saturday" && day != "Sunday")
All three parts of this condition are true so the statement price = price/2 is executed and price = 5. However, everyone with this coupon should get in free. So this part is incorrectly coded

b. an adult on Friday with the discount code
if part is False, else if part is true and price = 0 which is consistent

c. an adult on the weekend
if part is false, else if part is also false so price printed out is 10 which is consistent

d. a minor on the weekend
the if part is false and so is the else if part , so price is unchanged at 10. Consistent

e. an adult on a weekday
Both the if and else if parts are false, so price is unchanged at 10. COnsistent

The design development or study of computers is known a A graphic design B information technology C human services D robotics

Answers

The answer to your question is B, information technology. Information technology involves the development, design, and study of computers and other technologies used to manage and process information.

It includes hardware, software, networking, and communication technologies that enable the processing, storage, and transmission of information. The development of computers involves the creation and improvement of hardware and software components that are used to build computer systems. This includes the design of microprocessors, memory modules, storage devices, and other components that are used to create computer systems. The study of computers involves research into the capabilities and limitations of computer systems, as well as the development of new applications and technologies that can be used to improve their performance and functionality.

The field of information technology is constantly evolving, with new technologies and applications being developed all the time. This makes it an exciting and challenging field for professionals who are interested in working with computers and other technologies. If you are interested in pursuing a career in information technology, there are many opportunities available in areas such as software development, network administration, cybersecurity, and data analytics, among others.

Learn more about cybersecurity here: https://brainly.com/question/31928819

#SPJ11

5 evaluation criteria

Answers

Answer:

relevance, efficiency, effectiveness, impact and sustainability. 

An objective of the __________ is to provide a standardized set of I/O interface routines to user processes. Select one: a. working directory b. file management system c. indexed file allocation d. file directory Clear my choice

Answers

Option b (file management system) is used to provide a set of input/output interface.

A software package that focuses on providing numerous user-friendly features including productivity applications as well as file manipulations, respectively, would be termed as the file management system.

The other given alternatives such as:

Option a (Working directory) - The directory users are functioning in at present.Option c (Indexed file allocation) - The techniques of assignment dictate how documents have been saved on a disc.Option d (File directory) - A file storage place on your desktop.

These options are not connected to the given question. Thus the above answer is the correct one.

Learn more about the file directory here:

https://brainly.com/question/2170165

Select the correct answer from each drop-down menu. Computer memory stores data as a series of 0s and 1s. In computer memory, represents the absence of an electric signal and represents the presence of an electric signal.

Answers

Answer:

Zero (0); one (1).

Explanation:

Boolean logic refers to a theory of mathematics developed by the prominent British mathematician, called George Boole. In Boolean logic, all variables are either true or false and are denoted by the number "1" or "0" respectively; True = 1 or False = 0.

The memory of a computer generally stores data as a series of 0s and 1s. In computer memory, zero (0) represents the absence of an electric signal i.e OFF and one (1) represents the presence of an electric signal i.e ON.

What is the difference between weak AI and strong AI?

Answers

Explanation:Strong AI has a complex algorithm that helps it act in different situations, while all the actions in weak AIs are pre-programmed by a human. Strong AI-powered machines have a mind of their own. They can process and make independent decisions, while weak AI-based machines can only simulate human behavior.

Which branch of science helps avoid or minimize stress-related injuries at workplace?
is a branch of science that aims to design workplaces to minimize stress-related injuries.

Answers

Answer:

PUTANG INA MO MAMATAY KANA KING INA NYONG NGA AMERICANO

what two layers of the osi model are defined by docsis? (choose two.)A. channel bandwidthB. the separation of the voice and data transmissionsC. VPN tunneling requirementsD. modulation techniqueE. a deterministic media access method

Answers

The two layers of the OSI model that are defined by DOCSIS (Data Over Cable Service Interface Specification) are

1. Layer 1 (Physical layer): This layer is defined by aspects such as modulation technique (D) and channel bandwidth (A). DOCSIS uses various modulation techniques, like QAM, to transmit data over cable networks, and it allocates specific channel bandwidths for efficient data transfer.

2. Layer 2 (Data Link layer): At this layer, DOCSIS defines a deterministic media access method (E), which is the Time Division Multiple Access (TDMA) or Frequency Division Multiple Access (FDMA) method. These methods allow for the effective sharing of network resources among multiple users.

The other options, such as the separation of voice and data transmissions (B) and VPN tunneling requirements (C), are not specifically defined by DOCSIS in the context of the OSI model layers.

learn more about  OSI model here:

https://brainly.com/question/31713833

#SPJ11

TRUE / FALSE. the esi and edi registers cannot be used when passing 32-bit parameters to procedures.

Answers

The answer is False. The ESI (Extended Source Index) and EDI (Extended Destination Index) registers can be used when passing 32-bit parameters to procedures.

The ESI and EDI registers are general-purpose registers in the x86 architecture commonly used for string operations and memory addressing. They can also be used for passing parameters to procedures, including 32-bit parameters.

In the x86 calling conventions, function parameters are typically passed through registers or the stack. While specific calling conventions may vary, the ESI and EDI registers can be utilized to pass 32-bit parameters to procedures, along with other registers such as EAX, EBX, ECX, and EDX.

These registers provide additional flexibility for passing parameters and can be useful in certain programming scenarios. However, it is important to follow the specific calling convention guidelines and ensure proper usage of registers when passing parameters to procedures in order to maintain consistency and compatibility with the underlying system and compiler.

Learn more about registers here :

https://brainly.com/question/13014266

#SPJ11

Write a program that HARDCODE a word, and then writes out that word once per line but for each line replace the first character of the word with a space and remove the last character of the word. Continue until no characters are left. (You will have to be careful with words having an odd number of characters.)

NOTE: As always, you can use input instead of hardcode.

Enter a word -->ABARACADABARA
ABARACADABARA
BARACADABAR
ARACADABA
RACADAB
ACADA
CAD
A

Answers

The program that illustrates the information will be:

public class Main

{

public static void main(String[] args) {

String s="ABARACADABARA";

int l=s.length()-1;//get the length of test string

System.out.println(s);

StringBuilder str=new StringBuilder(s);//Use string builder to replace characters

for(int i=0;i<s.length()/2;i++){

str.setCharAt(i,' ');//set character to space

}

What is a computer program?

A computer program is a set of instructions written in a programming language that a computer can execute.

Software contains computer programs as well as documentation and other intangible components. Source code refers to a computer program in its human-readable form.

Learn more about program on:

https://brainly.com/question/23275071

#SPJ1

Which statement is correct? O a. There could be more than one critical path in a network of activities O b. Delay in performing the activities that are not on the critical path would never lead to a d

Answers

The correct statement is "There could be more than one critical path in a network of activities".

Critical Path Analysis is a technique utilized to define the critical path for a project plan or schedule, which includes determining the shortest time necessary to complete tasks.The critical path in a network diagram is the sequence of linked activities that takes the longest time to finish and is the most crucial path to follow to complete the project in the shortest possible time.If there is no delay in performing the critical path activities, the project is completed on time. In contrast, any delay in performing the activities on the critical path will result in the entire project being delayed.There might be more than one critical path in a network of activities.

When there are more than one critical paths, a delay in one of the activities that lie on one of the critical paths can cause a delay in the project's overall completion date.Therefore, in multiple critical paths, each path's duration is critical to completing the project on time. To ensure that project delivery times are kept to a minimum, the project manager should focus on the critical path tasks' timely completion while keeping an eye on the non-critical path tasks.CPA can provide visibility to all activities in the network of activities, allowing the project manager to optimize project delivery times, manage resources, and identify areas where the project can benefit from improving processes, skills, or technology to complete the project on time and within budget.

Learn more about network :

https://brainly.com/question/31228211

#SPJ11

For what reasons do readers use text-to-speech tools? Check all that apply.

Answers

Answer:d

Explanation:

Answer:

to support new language learning. to focus on important information. to hear a word's pronunciation. to better follow a text.

Explanation:

Because the user accesses files on cloud storage through a browser using an app from the storage provider, the actual media on which the files are stored are transparent to the user.
True or False.

Answers

The given statement "because the user accesses files on cloud storage through a browser using an app from the storage provider, the actual media on which the files are stored are transparent to the user." is true because cloud storage typically provides a user-friendly interface for accessing files stored on remote servers. The user can access these files through a web browser or through an app provided by the storage provider.

The actual media on which the files are stored (such as hard drives or solid-state drives) are not visible or accessible to the user. Instead, the user interacts with the files through the software interface provided by the cloud storage provider. This abstraction layer provides a level of convenience and ease-of-use for the user, while allowing the storage provider to manage the underlying hardware and infrastructure as needed.

You can learn more about cloud storage at

https://brainly.com/question/13092608

#SPJ11

wes is using usmt to migrate user profiles to newly purchased windows 10 computers in the organization. to begin the migration, he executes the scanstate.exe process on the source computers to collect user profile information. where is this information most likely to be stored?

Answers

Answer:

When using USMT (User State Migration Tool) to migrate user profiles, the scanstate.exe process is used to collect user profile information from the source computers. This information is most likely to be stored in a migration store, which is a location on the source computer where USMT stores the data that it collects.

The migration store can be specified by the user when the scanstate.exe process is run, or it can be set to a default location. The default location for the migration store is typically the local drive of the source computer.

Once the user profile information has been collected and stored in the migration store, it can be used to restore the user profiles to the target computers using the loadstate.exe process. The loadstate.exe process reads the data from the migration store and restores it to the target computers, allowing the user profiles to be transferred to the new Windows 10 computers.

Explanation:

an expanded version of a star schema in which all of the tables are fully normalized is called a(n):

Answers

A snowflake schema is an extended form of a star schema in which all of the tables have undergone full normalization.

A snowflake schema in computing is a logical setup of tables in a multidimensional database so that the entity relationship diagram looks like a snowflake. Centralized fact tables connected to various dimensions serve as the representation of the snowflake schema. A star schema's dimension tables can be normalized by a process called "snowflaking." When all of the dimension tables are fully normalized, the resulting structure resembles a snowflake with the fact table in the center. The basic idea behind snowflaking is to normalize dimension tables by splitting out low cardinality characteristics and creating new tables.

Similar to the star schema is the snowflake schema. In contrast, dimensions are standardized into numerous linked tables in the snowflake schema.

Learn more about snowflake schema here:

https://brainly.com/question/29676088

#SPJ4

Why is computer called information processing maching???​

Answers

Since, the computer accepts raw data as input and converts into information by means of data processing, it is called information processing machine (IPM).

HOPE IT HELPS ❣️

Answer:

Since, the computer accepts raw data as input and converts into information by means of data processing, it is called information processing machine or IPM.

Explanation:

does anybody have the answer to Exercise 2.5.7: Circle Pyramid for codehs python?

Answers

The Circle Pyramid for codehs python Yes, here is the solution.

What is the Pyramid ?

The Pyramid is a monumental structure that is characterized by its triangular shape, typically with a flat base and four steep sides that meet at a point at the top. Pyramids have been built all over the world in many different cultures, including Ancient Egypt, Mesoamerica, and China. The most well-known pyramids are those of the ancient Egyptians, which were built as tombs for the Pharaohs and their families.

Yes, here is the solution:

from turtle import *

# Set up your screen and starting position.

setup(500,300)

setworldcoordinates(-250,-150,250,150)

penup()

home()

# Draw the pyramid

pendown()

for i in range(4):

circle(25,360)

left(90)

forward(50)

# Hide your turtle

hideturtle()

# Close window on click.

exitonclick()

To learn more about Pyramid

https://brainly.com/question/5017673

#SPJ1

which is known as accurate processing of computer gigo E mail MHz bug​

Answers

GIGO is the considered as the accurate processing in computers.

In the field of computer science, the word GIGO stands for " garbage in, garbage out".

It is a concept that refers that if bad input is provided to the computers, the output will also be bad and useless.

It is the inability of the program to any bad data providing incorrect results.

Thus GIGO is the most accurate processing in a computer programs.

Learn more :

https://brainly.in/question/23091232

which is known as accurate processing of computer gigo E mail MHz bug

Your customer said that the language used in your program was offensive. This is an aspect of
O accuracy
O efficiency
O usability
O propriety

Answers

Answer: USABILITY

Explanation:

Perhaps efficiency

Answer:

Propriety

Explanation:

Right on Edge

Other Questions
In figure , ABllEF, angle ABC=[tex] {70}^{0} [/tex]and angle EFD =[tex] {40}^{0} [/tex]then find x The volume of a sample of gas at 273 K is 200. liters. If the volume is doubled at constant pressure, what will be the new temperature of the gas? Why data is important? hello please help ill give brainliest Do you agree or disagree with these statements? Please answer in Spanish in full sentences. Me gusta leer. Me gusta comer. exercise 9-11a record bonds issued at a discount and related semiannual interest (lo9-5) skip to question [the following information applies to the questions displayed below.] on january 1, 2021, white water issues $600,000 of 7% bonds, due in 10 years, with interest payable semiannually on june 30 and december 31 each year. assuming the market interest rate on the issue date is 8%, the bonds will issue at $559,229. An increasing function f satisfies f(10) = 5 and f'(10) = 8. Which of the following statements about theinverse of f must be true?(A). (f^-1)(5) = 10(B). (f^-1)(8) = 10(C). (f^-1)(5) = 8(D). (f^-1)(5) = 1/8 4. Indicate which of the following has the greatest momentum: a 500 kg carmoving at 64 km/h, a 250 kg cart moving at 128 km/h, or a 1,000 kg truckmoving at 32 km/h. Explain your answer Sampling distributions Which term is used by talking parsons and Robert bales to refer and emphasises tasks focused in more distant goals and concerned for external in ones family and other social institutions. (Expressiveness and Instrumentality)Instrumentality refers to an emphasis on tasks, a focus on more distant goals, and a concern for the external relationship between one's family and other social institutions.Instrumental role is performed by men. 1. Assume:Yd = $194,000b = .90a = $ 8,000A)What is consumption (C) ?B)What are savings (S) ?C)What is APC ?D)What is APS ?2. Assume:Yd = $ 5000 billionb = .95a = $ 520 billionA)What is consumption (C) ?B)What are savings (S) ?C)What is APC ?D)What is APS ?3. For the following problem, assume that the MPC, b, takes into account how much consumers spend as total income (Y) in the economy is changes. (Also: Hint GDP = Total Y) So we can rewrite our consumption function as :C= a +bYAssume:a= $2900 billionb=.75GDP= $9,000 billion.A) What is C=B) What is S=C) If consumers were the only ones buying goods in the economy, would the economy have an excess supply of goods, excess demand of goods or would the economy be at equilibrium ? What was the srivijaya social structure (ex. gender roles, social classes and hierarchy, family and kinship, etc)? Overthrust belt of central Utah and eastern Idaho: what it is, some typical structural geometries, when it formed, and its importance in petroleum resources Sketch if possible I just this one please someone help What are the two dimension in lodens wheel of diversity? The United States and France both produce sweaters and caps. Suppose that a US worker can produce 50 caps per hour or 1 per hour and French worker can produce 40 caps per hour and 2 sweaters per hour. Based on this scenario, which statement is true? What is the least common mental health problem of those listed? depression su!cide anorexia nervosa dissociative identity disorder A nurse is caring for a client who has streptococcal pharyngitis and an allergy to penicillin. The nurse should recognize that which of the following drugs can be safely administered to this client?Azithromycin/Erythromycin.Rationale: Azithromycin, a macrolide, is an acceptable alternative to penicillin for patients who have bacterial infections and are allergic to penicillin. The medication is effective against many gram-positive and gram-negative bacteria and is used for streptococcal pharyngitis.- Nafcillin and amoxicillin/clavulanic acid are penicillins and are contraindicated for those w/a penicillin allergy. Vancomuycin and clindamycin are safer alternatives.- A small percentage of clients who are allergic to penicillin have a cross sensitivity to cephalosporins. Cephalexin is a cephalosporin and is an inappropriate choice for the client. In schools or class the role of the producer is normally fulfilled by the classroom teacher involves evaluating credit applications and collecting amounts owed by credit customers