list four types of systems that may require software safety cases, explaining why safety cases are required.

Answers

Answer 1

List four types of systems that may require software safety cases, such as

Bank SystemsHospital / Laboratory SystemsGovernment SystemsFlight Control Systems

Software engineers should hold some sort of professional certification or license if they will be involved in the specification and development of safety-related systems. People who are experts and have knowledge in this development are required to work on the definition and development of a safety-related system since they are responsible for the users of the system's safety. Experts or specialists are also required to guarantee the system's effectiveness and safety.

Learn more about Software

https://brainly.com/question/28224061

#SPJ4


Related Questions

Any help would be greatly Appreciated! :)​

Any help would be greatly Appreciated! :)

Answers

I think the answer is A or E.

Explain the role of ANY TWO components of the CPU

Answers

Answer:

An arithmetic logic unit (ALU) is a digital circuit used to perform arithmetic and logic operations.

The control unit of the central processing unit regulates and integrates the operations of the compute

Choose one scene or object to photograph. Take and submit at least three photographs of this scene at three different times of day. Be sure to note the times of day that you choose. Write a brief response about how the light changed in the photograph.
Take and submit photographs of someone using frontlighting, backlighting, and sidelighting. You can use the sun or other lighting.
Practice taking photographs on a cloudy or rainy day. Turn in three of your favorites from that practice.
Take some portrait photographs using a reflector. (Remember that white paper, poster board, sheets, or a wall can all act a reflector.) Practice moving the subject in different positions relative to the reflector. Turn in three of your favorite photographs.
Practice taking photographs in different lighting conditions (indoors and outdoors, different times of day, different weather, and so on) to help you better understand the impact of light on your photographs. Turn in three of your favorite photographs from your practice sessions.

Answers

Answer:

i dont get what you mean

Explanation:

Which features allows the user to insert individual names in a primary document?

Answers

Features allows the stoner to fit individual names in a primary document is to insertion, omission, copying, pasting and for formatting the document is font type, bolding, italicizing or underscoring.

What's MS Word?

Microsoft Word is a word processor that may be used to produce papers, letters, reports, and other types of jotting of a professional quality. It includes sophisticated capabilities that give you the stylish formatting and editing options for your lines and systems.

Both the Windows and Apple operating systems support Microsoft. Microsoft Word is a element of the Microsoft Office productivity suite, though it can also be used singly. Since its original 1983 release, Microsoft Word has experienced multitudinous variations. Both Windows and Mac computers can use it.

Microsoft Word can be used for a variety of tasks :

Creating business papers with a variety of images, similar as prints, maps, and plates. Saving and reusing-formatted textbook and rudiments like cover runners and sidebars. Making letters and letterheads for both particular and professional use. Creating a variety of documents, including resumes and assignation cards. Producing a variety of letters, ranging from simple office memos to legal clones and reference documents.

Learn further about MS Word click then :

brainly.com/question/25813601

#SPJ1

write a matlab program in a script file that finds a positive integer n such that the sum of all the integers 1 2 3 n is a number between 100 and 1,000 whose three digits are identical. as output, the program displays the integer n and the corresponding sum.

Answers

Answer:

%% Positive Integer between 100 and 1,000 with Identical Digits

% Initialize variables

n = 0;

sum = 0;

% Loop until an integer is found that meets the requirements

while sum < 100 || sum > 1000 || length(unique(num2str(sum))) ~= 1

   n = n + 1;

   sum = sum + n;

end

% Print the integer and corresponding sum

fprintf('The integer is %d and the sum is %d.\n', n, sum);

You are writing a paper and find some information you want to use in a journal article: Original text: Among students with incorrect answers at pre- and posttest, the largest percentage had trouble recognizing an example of patchwork plagiarism. Apparently, many did not understand that cutting and pasting is plagiarism. Source: Fenster, Judy. "Teaching Note—Evaluation of an Avoiding Plagiarism Workshop for Social Work Students." Journal of Social Work Education, vol. 52, no. 2, Apr-Jun 2016, pp. 242-248. Academic Search Complete, doi:10.1080/10437797.2016.1151278 Entry in your paper: Among students with incorrect answers, most couldn't recognize patchwork plagiarism and did not understand that cutting and pasting is plagiarism. What is your judgment- is this plagiarism?

Answers

Answer:

The answer is "True".

Explanation:

The term Plagiarism is a word, that implies as a form of cheating, which includes the usage, of all or part, of its thoughts, words, designs, arts, the music of anyone else without any of the author's recognition or permission.

In the question, it is already defined that students copy and paste the data, which is lying in the criteria of plagiarism, that's why the given statement is "true".

Choose the best answer to complete the sentence.

A transferable skill can be applied:

in a variety of situations and roles.

in only one setting or situation.

in every situation.​

Answers

Answer:

First is A

Explanation:

Second is B,C,F

xavier is developing a file system in which users will have the ability to grant editing permissions to their colleagues. what type of access control model is this approach using?

Answers

Since Xavier is developing a file system in which users will have the ability to grant editing permissions to their colleagues. The type of access control model in this approach using option D: DAC: Discretionary Access Control.

What does "discretionary access control" mean?

The Trusted Computer System Evaluation Criteria is one that define discretionary access control as a sort of access control used in computer security to limit access to objects depending on the identity of subjects and or seen as groups to which they belong.

Therefore, in the above context, the concept of limiting access to things based on the identity of the subject is known as discretionary access control (the user or the group to which the user belongs). Access control lists are used to implement discretionary access control.

Learn more about Discretionary Access Control from

https://brainly.com/question/15152756
#SPJ1

See full question below

Xavier is developing a file system in which users will have the ability to grant editing permissions to their colleagues. What type of access control model is this approach using?

A. MAC, B. RBAC, C. ABAC, D. DAC

on examining the source code you find a hidden routine that allows access to any account using the password wrtsglz, regardless of the normal password associated with that account. what kind of vulnerability have you uncovered?

Answers

A backdoor is when a hacker tries a number of different user credentials in an effort to guess the right ones.

Which phrase describes an attack that happens before the security industry learns about and patched a security flaw?

A threat known as a zero-day attack aims to take advantage of a software application vulnerability before the vendor of the application learns of it and before the vulnerability is widely publicized by the internet security community.

How do you describe a program that was created to exploit a security flaw?

A piece of code that exploits a software weakness or security fault is called an exploit. It is created either by malicious actors for use in their operations or by security researchers as a proof-of-concept threat.

to know more about hackers here:

brainly.com/question/29215738

#SPJ4

What is the result when you run the following program? print(2 + 7) print("3 + 1") Responses 9 4 9 4 9 3 + 1 9 3 + 1 2 + 7 4 2 + 7 4 an error statement

Answers

The word "program" can be used as a verb. To establish, control, or alter something in order to get a certain outcome.

Thus, Both Americans and Britons prefer the spelling "program" when discussing developing code. By the age of 18, youth not enrolled in the Chicago CPC program had a 70% higher chance of being detained for a violent offense.

And by the age of 24, program participants were 20% less likely to have spent time in a jail or prison. A robot in the shape of a caterpillar called Code-A-Pillar is one of the devices. Its interchangeable parts each add a different movement command to the device as a whole, allowing the young scholars to program the robot's behavior as they figure out a pattern to get it from point A to point B.

Thus, The word "program" can be used as a verb. To establish, control, or alter something in order to get a certain outcome.

Learn more about Program, refer to the link:

https://brainly.com/question/30613605

#SPJ1

The short-range two-way communication technology behind contactless payments is called ____.

Answers

Hi there,

I hope you and your family are staying safe and healthy!

The answer is: Near Field Communication (NFC).

The short-range two-way communication technology behind contactless payments is called the Near Field Communication (NFC).

Happy to help!

~Garebear

What do devices provide? A.data to be processed B. Software code C.text and images only D.results of processing.

Answers

A is the correct answer!

briefly explain about five kinds of network topology ​

Answers

Answer:

The mapping of the LAN (local area network) is design called as Topology.

Explanation:

The network topology is to perform a arrangement of the network to the connect sender and receiver in the network connection, there is a five type of topology is there are:- (1) tree topology (2) star topology (3) ring topology (4) bus topology (5) mesh topology.

(1) Tree topology is the nodes are connecting to the hierarchical form it is called by the hierarchical topology its used in the wide area network, and they are manage and maintain the easily, they work in the group.(2) star topology is to the connected to the all computers in a single hub cable through, it is dedicated to the hub connection, star topology is the setup and modify to the network and nodes and low network, is to expensive to use.(3) Ring topology is tho perform it computer to connect by the another computer for each device, ring topology is the use large number and to star topology is to install and expand, troubleshooting is the difficult in the ring topology.(4) Bus topology is the contain computer network device is connected to the single cable, and this only one direction system, bus topology is used in small networks and bus topology is the cost effective, and the bus topology is the limited length cable.(5) Mesh topology is to perform point to point connection to computer devices, and to transmits data to two ways (1) routing (2) flooding.Mesh routing is network requirement and has information of the broken links.Mesh flooding is transmitted to the all computer network and leads to load over network.

differences between placeholders and textbook in PowerPoint ​

Answers

Answer:

fifthly, if it is an empty box. it disappear completely. sixth the size of a text box changes depending on the length of a text that we type . this is in contrast with a place holder box where changes are made of the font of the text

Explanation:

mark me a brainlist

a nested if statement only executes if the if statement in which it is nested evaluates to true.
true/false

Answers

True. A conditional statement that is nested inside another if statement is referred to as a nested if statement. As the nested if statement will only be executed if the outer if statement evaluates to true, this enables more complex decision-making in the code.

In other words, the outer if statement's condition is what determines whether the nested if statement applies. No matter if the nested if statement's own condition is true or false, it will not be performed if the outer if statement's condition is false. Given that the nested if statement will only be run if it is genuinely essential, this can aid in code optimization and reduce the need for pointless computations. It's critical to check that the logic of the nested if statement is sound because any flaws could cause the programme to behave unexpectedly.

learn more about Nested here:

brainly.com/question/13971698

#SPJ4

What skills and practices help
when we code web pages?

Answers

Answer:

You should also ideally have an aptitude for - or experience of - elements such as:

User experience (UX)

User interface (UI)

Visual design.

Coding languages including HTML and CSS.

Frontend web programing languages and skills such as JavaScript, Ajax and web animation techniques.

Explanation:

have u good day

17. Describe bandwidth and give an example. (5pts)​

Answers

Answer:

a range of frequencies within a given band, in particular that used for transmitting a signal.

Explanation:

you only have a serton amount of bandwidth on your phone

They use trasminaron

What is the different between a regression problem and a classification problem? Is face detection problem a regression or classification problem?

Answers

Regression problem and a classification problem are two different types of machine learning problems. The difference between them is that regression problems involve predicting continuous values while classification problems involve predicting categorical values.

Regression problems involve finding a relationship between input variables and a continuous output variable. The goal of regression is to make a prediction about the output value based on the input variables. Examples of regression problems include predicting the price of a house based on its location, size, and other features, and predicting the temperature based on time and weather conditions.

Classification problems, on the other hand, involve assigning input variables to a discrete category. The goal of classification is to predict the category to which a given input belongs. Examples of classification problems include predicting whether an email is spam or not based on its content, and predicting whether a tumor is malignant or benign based on medical data.

Face detection problem is a classification problem because it involves predicting whether a given input (an image) contains a face or not. The output is binary: the image either contains a face or it does not. Therefore, face detection is a classification problem.

In summary, the main difference between a regression problem and a classification problem is that the former involves predicting continuous values while the latter involves predicting categorical values.

To know more about features visit:

brainly.com/question/31563236

#SPJ11

Compound conditions require a computer to sense whether multiple conditions are true or false.

True
False

Answers

Answer:

False

Explanation:

You can have multiple conditions in your while and for loops as well as your if statements.

A security hole is a(n): Group of answer choices packet-level firewall small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution ANI system

Answers

Answer: malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.

Explanation:

A security hole is the malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.

A security hole is regarded as a software flaw that allows someone who isn't authorized to have access to the system. This vulnerability can be taken advantage of by a hacker or other threat factors.

when backing up an ios device to a cloud service the first recommended step is to

Answers

Answer:

make sure that your device is connected to wifi

Explanation:

I think that's the answer because cloud service needs wifi (duh). Hope this helps!

Answer:

The first recommended step is to connect to an internet connect, and not your mobile WiFi as it can take a lot of GB.

PLZ HELP ASAP

Jaelyn is working late at night on a project that is due the next day. She is not sure how to add a picture to her document, and it is too late to call or text her teacher or friends. What is the best option for Jaelyn?
1-Decide not to use a border.
2-Provide negative feedback to Office Online.
3-Type a question in the “Tell me what you want to do” box.
4-View accessibility options.

Answers

Answer:

its accessibility options

Explanation:

because on office that's were you go to view what you can do

Answer:

its accessibility

Explanation:

I took the test

When an application has multiple uses what is it known as?.

Answers

Answer:

an application that had multiple uses is called full featured

is an impact printer makes contact with the paper. ​

Answers

Answer:

Yes

Explanation:

because the name impact

Which branch of study can help Jessica study the concept of light

Answers

Answer:

Physics, Quantum Mechanics

Explanation:

Light is a stream of photons with no weight. If you want to dig deeper in this mysterious phenomena, you should study physics and quantum mechanics. Physics takes up things like the theory of relativity, which can be useful in studying spacetime and how light travels through it, and quantum mechanics, being the study of matter in an atomic level, should help you get an understanding on how photons of light travel and why they behave so strangely.

Answer:

Physics

Explanation:

the _________ is a global system of linked, hypertext documents.

Answers

A global system of connected, hypertext documents makes up the World Wide Web.

The World Wide Web: What is it?

The World Wide Web, commonly referred to as the web, WWW, or W3, is a collective term for all publicly accessible websites and other online content that people can access on their personal computers and other internet-connected devices. Users can click on the hyperlinks that connect these pages and publications to get more information.

Why is it used the World Wide Web?

Not just scientists now have access to the internet thanks to the world wide web. People could now obtain knowledge, exchange it, and communicate with one another much more easily thanks to how the world was connected. Since then, it has made it possible for people to use social networking sites, video sharing, and other platforms to share their ideas and labor.

To know more about  World Wide Web visit:-

https://brainly.com/question/28318870

#SPJ4

Which of the following is NOT an example of application software

Which of the following is NOT an example of application software

Answers

Answer:

Option B is the answer.

Windows operating system is not an example of application software. Thus, the correct option for this question is B.

What is an Operating system?

An Operating system may be defined as a type of system software that significantly regulates computer hardware along with software resources.

It also delivers some common services for processing computer programs. The operating system controls the input instructed by the user to the computer with respect to the output delivered by the computer to the user.

Options like photoshop image editing programs, internet explorer web browsers, and Microsoft Powerpoint presentation software are all examples of application software while Windows operating system is an example of system software.

Therefore, among the options given, the windows operating system is not an example of application software. Thus, the correct option for this question is B.

To learn more about Types of software, refer to the link:

https://brainly.com/question/18661385

#SPJ2

PLEASE HELP ASAP


Which selection from the article BEST supports the conclusion that the practice of looking at applicants' social media use is growing?


Question 2 options:


Six hundred percent more employers use social media to screen than they did in 2006.



Seventy percent of employers use social networking sites to research job candidates.



This survey found that 35 percent checked applicants' social media profiles. Many who do say social media has influences their admission decision.



The CareerBuilder survey found 44 percent of employers who screened candidates using social networks found positive information

Answers

The selection from the article that best supports the conclusion that the practice of looking at applicants' social media use is growing is that Seventy percent of employers use social networking sites to research job candidates."

This statement strongly supports the conclusion that the practice of looking at applicants' social media use is growing because it states that a large percentage of employers are currently using social media to research job candidates.

It suggests that a large portion of employers are utilizing social media as a tool for researching job candidates, which implies that the practice is becoming increasingly common.

Learn more about social networks here: https://brainly.com/question/23976852

#SPJ4

There are many options for using Python in the cloud. What should you check if you experience errors with standard syntax? Select an answer: the compression method the version of the Python kernel being used the fonts and color schemes for the editor the version of the exercise files

Answers

If you encounter errors with standard syntax while using Python in the cloud, it is recommended to check the version of the Python kernel being used as it could be incompatible with the version of the programming language you're using.

If you experience errors with standard syntax while using Python in the cloud, you should check the version of the Python kernel being used.

Python is a popular high-level programming language for general-purpose programming. It's utilized in web development, data analysis, artificial intelligence, scientific computing, and other fields. Python is open-source software, which means it's free to use and distribute.

Cloud computing is a model for delivering services on-demand over the internet, like servers, storage, databases, networking, software, analytics, and intelligence, rather than using your local server or computer. The pay-as-you-go service is accessible from any location with an internet connection.

There are various options for using Python in the cloud. Let's have a look at some of the most common ones:

Web Services: It's a collection of remote computing services provided. It provides cloud computing services that can help you get your project up and running quickly.Azure: It's a cloud computing service created by that is frequently used for building, testing, deploying, and managing applications and services through a network of managed data centers.Cloud Platform: It's a collection of cloud computing services provided. It provides cloud computing services that can help you get your project up and running quickly.OpenShift: OpenShift is a container application platform for deploying and managing cloud-native applications that allows you to deploy and scale your Python applications in the cloud.

If you experience errors with standard syntax while using Python in the cloud, you should check the version of the Python kernel being used. This may occur if the kernel version used is incompatible with the version of the programming language you're using.

Learn more about standard syntax: brainly.com/question/20935990

#SPJ11

Which of the following policies should be adopted to help reduce increasing congestion caused by devices attempting to resend lost packets too quickly or too often?
Retransmission policy
Window policy
Discarding policy
Admission policy

Answers

The retransmission policy should be adopted to help reduce the increasing congestion caused by devices attempting to resend lost packets too quickly or too often.

A retransmission policy is a technique that requires the sending of packets until an acknowledgment is received from the receiver. When a packet is sent, it is kept in the queue until an acknowledgment is obtained. If no acknowledgment is obtained, the packet is considered lost and is retransmitted.

This cycle of sending and resending packets causes congestion in the network. As a result, the retransmission policy should be implemented to reduce congestion caused by devices that attempt to resend lost packets too frequently or too quickly.

The issue of too many packets present in the network at the same time, slowing data transmission and affecting the quality of service, is known as congestion. Congestion causes packet loss, slows data transmission, and lowers service quality, which affects the user experience. The following are some common sources of network congestion:

Too much traffic in the network.Failure to keep up with traffic spikes.Network devices' processing power is limited.Poor network design.

Packet loss occurs when one or more packets of data traveling through a network do not reach their intended destination. It may be caused by network congestion, poor network design, hardware failure, or packet corruption. When packet loss occurs, the data contained in the packet must be resent, resulting in increased network traffic, delays, and poor service quality.

You can learn more about retransmission at: brainly.com/question/28274178

#SPJ11

Other Questions
a ratio that relates two quantites with different units of measure is a (blank) need a reply fast ASAP !!!! Copper(II) sulfate is an example of a substance that dissolves in water. Copper(II) sulfate is an ionic compound with the chemical formula CuSO4 and when it is added to water it dissociates into Cu2+ and SO42 ions. Students used both copper sulfate crystals and copper sulfate powder in this experiment on the rate of dissolving. Choose one statement that represents a valid conclusion based on the student data?A) The smaller the solute particles the more energy they have. Increased energy results in shorted dissolving time.B) A given quantity of solute dissolves faster when it is ground into small particles because more surface area is exposed.C) As the water temperature increased, the copper sulfate crystals dissolved faster but there was little change for the powdered form.D) Agitation of the powder allows fresh solvent molecules to continually be in contact with the solute 5. 7 movie tickets for $56 Suzy's picture frame is in the shape of the parallelogram shown below. She wants to get another frame that is similar to her current frame, but has a scale factor of 12/5 times the size. What will the new area of her frame be once she upgrades? n 19 in. 2.4 24 in. can someone please help me with this :) i only have one more try to get it right and if not i get 0/10 Round the decimal equivalent of 856 1/6 to the nearest hundredth. What number is in the hundredth place PLEASE HELP Deandra is doing her math homework. She completed the first 6 problems in 2 hours and the last 12 problems in 3 hours.Which best describes Deandras rate for completing her homework? Ratios are these equivalent : 11/7 and 77/63 , 3/5 and 45/75 , 1/8 and 10/80 , and 2/9 and 18/81 Who supervises the actors and action in a production of a play? Your mom needs to borrow grocery money from you to feed you and your eight brothers and sisters. You agree to lend her the money at 12% interest compounded annually. She agrees and tells you she can pay you $300 in one year, $400 in two years, and $200 in three years. How much are you going to lend her Que es una Progresin Aritmticas consider a convex n-gon such that no 3 diagonals intersect at a single point. draw all the diagonals (i.e. connect every pair of vertices by a segment). (a) how many intersections do the diagonals determine? based solely on their current weighted average cost of capital, which company should pursue an investment opportunity with an expected return of 6%? If HS behaves as a base in water, what products will be formed? Select all that applyA.OHB.H3O+C.S2-D.H2OE.H2S an obese adult has recently been diagnosed with type 2 diabetes. the nurse knows that the most likely treatment plan for this client will include which topics? When the price of a pepsi is $1.00 and the price of a coke is $0.60, the vending machine sells _____ cans of coke. step by step plsProblem 5: [15 pts] Solve the following IVP using Green's function y" - y = ex y(0) = y'(0) = 1 Why does Thane Rosenbaum open his essay withexamples from France and Israel? In what waysare their free speech laws different from those ofthe United States? modern humans (homo sapiens) and archaic humans called neanderthals (h. neanderthalensis) shared a common ancestor in africa but diverged in different geographic areas. when modern humans migrated out of africa and dispersed around the world starting about 100,000 years ago, they overlapped with neanderthals in europe. this scenario is best described as Please read the the article on the Trail of Tears.After completion of the article please complete a two paragraph letter urging President Jackson to stop the Indian Removal Act.Site examples as how the Native way of life has been disrupted by war, disease, and manipulation.