Computers and Technology

Imtiaz is the greatest chain of superstores arranged in different areas of Pakistan. The organization has in excess of 670,000 representatives working in these superstores. Aside from PAK, the organization likewise works in different nations and has as of late chose to open their stores in the UAE. Hence, the enlistment group of Imtiaz distributed different occupation opening through their Web website and nearby papers. The enrollment procedure is of two sorts: inward and outside. In the inside enlistment process, the rundown of current workers searching for an advancement are chosen dependent on their skill and likewise an ability pool is made. Additionally, in the outer enlistment process, the filled application structures are acknowledged through the Web website. The chose candidates are then met followed by an appraisal in the last phase of the determination procedure.

To computerize the procedure of enlistment, the administration has thought of building up a product application. You, as one of the colleague of the advancement group have been approached to recognize the accompanying:

1. Which of the accompanying methodology must be followed for growing such an application: organized or object-arranged methodology? Legitimize your answer with appropriate clarification.

2. Distinguish different classes that will be made in the application. Likewise, recognize the different characteristics and techniques for the distinguished classes.

3. Clarify the advantages of utilizing Java programming language for building up the enrollment application.

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 09:00, paulusl19
The first screen you see when you open word2016 what is called?
Answers: 1
image
Computers and Technology, 23.06.2019 12:00, xojade
Which of these is an example of an integrated presentation? a. a table created in powerpoint b. an image pasted into powerpoint c. a caption created in powerpoint d. an excel chart pasted into powerpoint
Answers: 1
image
Computers and Technology, 24.06.2019 21:30, keelynnbarrier
Computer security/cybersecurity1) each of the following code fragments contains a number of security vulnerabilities. for each fragment, identify these security vulnerabilities and, for each vulnerability, discuss at least one way that it could be improved. note that in your discussion of how each vulnerability could be improved, you do not need to re-write a new version of the program in c; simply discuss your solution, either in pseudocode or in 1-2 sentences. a) /* file descriptor leak */#include #include int main(int argc, char *argv[]){ char *filepath = argv[0]; char *shellpath = argv[1]; file *passwords; passwords = fopen(filepath, "r"); /* read the password and do something with it */ /* . . */ /* fork and execute alternative shell */ execl(shellpath, "shell", null); }b)#include /* assume the following function is written for an electronic storefront. the user will enter the id of the item to be ordered, as well as the quantity of units that they would like to purchase. the program will then lookup the price for the price for the item using a predefined function, and return the total cost of the order.*/int gettotalcost(){ char itemid[9]; int price, unitsordered, cost; printf(" enter the 9-digit id of the item to be ordered: "); scanf("%s", & itemid); /* lookup the price according to the itemid */ price = getpricebyid(itemid); printf(" enter the quantity of units to be ordered: "); scanf("%d", & unitsordered); cost = price * unitsordered; return cost; }c)#include /* the following function is intended to return a user's full name by concatenating the user's first and last name into a single string and then returning that string. */char *getfullname(char *firstname, char *lastname, int max_len){ char fullname[max_len]; strcpy(fullname, firstname); strcat(fullname, " "); strcat(fullname, lastname); return fullname; }d)#include /* the following code snippet runs through the list of cli arguments entered and displays them to the console. */int main(int argc, char *argv[]){ int i; printf("you've entered the following arguments: "); for(i = 0; i < argc; i++){ print(argv[i]); printf("\n"); } /* */}
Answers: 2
image
Computers and Technology, 25.06.2019 13:00, Jofish5815
Involves gauging oneself against the achievements of peers. self-fulfilling prophecy. social comparison. indirect evidence. self-concept.
Answers: 1
Do you know the correct answer?
Imtiaz is the greatest chain of superstores arranged in different areas of Pakistan. The organizatio...

Questions in other subjects:

Konu
Mathematics, 14.12.2020 02:50
Konu
Mathematics, 14.12.2020 02:50
Konu
Mathematics, 14.12.2020 02:50