1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nostrana [21]
2 years ago
13

How are the waterfall and agile methods of software development similar?

Computers and Technology
1 answer:
Darya [45]2 years ago
4 0

Answer:

Step 1 in an Agile project is similar to Waterfall’s first step. Both steps focus on collecting product requirements, but Agile stipulates the requirements from the client.

Explanation:

You might be interested in
What is Fill handle?
vesna_86 [32]

Answer: I copied and pasted my answer if you need the website to cite information let me know

Explanation:

Fill Handle is a feature in Excel that enables you to auto-complete a list in a row/column by simply dragging it using your mouse. A basic understanding of fill handle in Excel could save you some time and make you more productive.

6 0
2 years ago
which endpoint application runs on an endpoint device that only detects an attack in an endpoint device? chqgg
WARRIOR [948]

A host-based intrusion detection system works similarly to a network-based intrusion detection system in that it can monitor and analyze both the internal workings of a computer system and the network packets on its network ports.

<h3>What is Host-Based IPS?</h3>
  • A host-based intrusion detection system works similarly to a network-based intrusion detection system in that it can monitor and analyze both the internal workings of a computer system and the network packets on its network ports.
  • The Host-based Intrusion Prevention System (HIPS) guards against malicious software and other activities that aim to harm your computer. HIPS uses sophisticated behavioral analysis in conjunction with network filtering's detection capabilities to keep track of active programs, files, and registry keys.
  • The integrated endpoint security system known as endpoint detection and response (EDR), also referred to as endpoint threat detection and response (ETDR), combines real-time continuous monitoring and gathering of endpoint data with rules-based automated reaction and analysis capabilities.

To learn more about Host-Based IPS refer to:

brainly.com/question/20490376

#SPJ4

5 0
1 year ago
Which of the following storage devices allows access to information in a sequential mode?
katrin [286]
It is either hard drive or solid state drive
4 0
3 years ago
Read 2 more answers
Identify which of these types of sampling is​ used: random,​ systematic, convenience,​ stratified, or cluster. To determine her
Zarrin [17]

Answer:

B.

Explanation:

Based on the sampling methods provided in regards to the question it can be said that the method being used is called Simple Random. This refers to dividing the population into different group which are then chosen at random, giving each group an equal chance of getting chosen. Which is exactly what is going on in this scenario, as the day is divided into three parts and her mood is measured randomly during each part of the day.

6 0
3 years ago
In the context of an expert system, a _____ works with the knowledge base management system to ensure that the knowledge base is
defon

Answer:

Knowledge Acquisition Facility.

Explanation:

The power and effectiveness of the Expert System  is equal to the quality of the knowledge it contains. The  knowledge has to deal with high complexity and apply the best judgement. collection of expert knowledge is very important and involves the collecting information about a field usually from  an expert. This information is stored in a computer program stored as a knowledge base.

Knowledge is always updating so it also very important to keep it up to date and it is done by Knowledge Acquisition Facility.

3 0
3 years ago
Other questions:
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • Zach wants to learn a programming language to create games and applications. this programming language will also create web appl
    12·2 answers
  • What is the term for a device that converts digital data from a computer into analog signals and back again?
    9·1 answer
  • Is a fundamental building block of a relational database because this object stores all of the data
    15·1 answer
  • You have been given the job of creating a new order processing system for the Yummy Fruit CompanyTM. The system reads pricing in
    8·1 answer
  • . Write a short program that asks the user to input a string, and then outputs the
    15·1 answer
  • What power brake uses vacuum from the engine to aid in brake application?
    6·2 answers
  • Using pointers and shared memory for IPC, what would you need to add to your code to ensure data integrity?
    15·1 answer
  • Paolo, a popular basketball player in school was asked by his coach, how is your family
    8·1 answer
  • I will have to goste yall im busting my butt off doing homework
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!