subject

Imtiaz is the greatest chain of superstores arranged in different areas of Pakistan. The organization has in excess of 670,000 representatives working in these superstores. Aside from PAK, the organization likewise works in different nations and has as of late chose to open their stores in the UAE. Hence, the enlistment group of Imtiaz distributed different occupation opening through their Web website and nearby papers. The enrollment procedure is of two sorts: inward and outside. In the inside enlistment process, the rundown of current workers searching for an advancement are chosen dependent on their skill and likewise an ability pool is made. Additionally, in the outer enlistment process, the filled application structures are acknowledged through the Web website. The chose candidates are then met followed by an appraisal in the last phase of the determination procedure.

To computerize the procedure of enlistment, the administration has thought of building up a product application. You, as one of the colleague of the advancement group have been approached to recognize the accompanying:

1. Which of the accompanying methodology must be followed for growing such an application: organized or object-arranged methodology? Legitimize your answer with appropriate clarification.

2. Distinguish different classes that will be made in the application. Likewise, recognize the different characteristics and techniques for the distinguished classes.

3. Clarify the advantages of utilizing Java programming language for building up the enrollment application.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 03:50
You are working as a security analyst in a company xyz that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8. while monitoring the data, you find a high number of outbound connections. you see that ip's owned by xyz (internal) and private ip's are communicating to a single public ip. therefore, the internal ip's are sending data to the public ip. after further analysis, you find out that this public ip is a blacklisted ip, and the internal communicating devices are compromised. what kind of attack does the above scenario depict?
Answers: 3
question
Computers and Technology, 22.06.2019 07:00
For all machines-not just hammers- the user applies force force to the machine to the machine over a certain distance. a. input b. output c. duo d. none of the above
Answers: 1
question
Computers and Technology, 22.06.2019 15:30
Why would a programmer use the logical operator and in an if statement? a: when an action is to be taken that requires both conditions to be falseb: when an action is to be taken that requires both conditions to be truec: when an action is to be taken that requires the first condition to be falsed: when an action is to be taken that requires the second condition to be truei took the test and the answer is b.
Answers: 3
question
Computers and Technology, 22.06.2019 23:30
Define a function printfeetinchshort, with int parameters numfeet and numinches, that prints using ' and " shorthand. ex: printfeetinchshort(5, 8) prints: 5' 8"
Answers: 1
You know the right answer?
Imtiaz is the greatest chain of superstores arranged in different areas of Pakistan. The organizatio...
Questions
question
Business, 27.11.2020 01:10
question
English, 27.11.2020 01:10
question
Mathematics, 27.11.2020 01:10
question
Mathematics, 27.11.2020 01:10
question
History, 27.11.2020 01:10
question
Mathematics, 27.11.2020 01:10
question
Mathematics, 27.11.2020 01:10
Questions on the website: 13722362