1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vladimir1956 [14]
2 years ago
5

What is software engineering? What are the objectives of software engineering?

Computers and Technology
1 answer:
Mashutka [201]2 years ago
7 0

Answer:

The basic objective of software engineering is to develop methods and procedures for software development that can scale up for large systems and that can be used consistently to produce high-quality software at low cost and with a small cycle of time.

Explanation:

You might be interested in
Which action best describes a branch in a computer program
weeeeeb [17]
<span>This would be a jump to a line number that is non sequential. This is the best way to describe this process. </span>
3 0
3 years ago
How to reply to text from unknown number?
Leto [7]
Safest way: DO NOT reply and BLOCK number.

If you are not sure if the guy is related to some stuff, it will be better to call him back, instead of texting.
5 0
3 years ago
Hideous<br>sprouting<br>staggered​
nydimaria [60]

Answer:

Free points Im guessing

Explanation:

7 0
4 years ago
Which statements describe OneDrive?
Vesna [10]

Answer:

OneDrive is a storage location on your personal computer.

Explanation:

Its gives u extra storage as well as helps u to take backup for all ur files that are important to u

Hope this helps...

Pls mark my ans as brainliest

If u mark my ans as brainliest u will get 3 extra points

6 0
3 years ago
Read 2 more answers
Detailed ___ highest risk warnings can incude identifiying which vendor updates apply to which vulnerablities as well as which t
BigorU [14]

Answer:

Intelligence  is the correct answer.

Explanation:

Because the high-risk intelligence is the complicated warning that can be involved in recognizing those vendors who update the following and apply it to the exposure in which defenses have been founded to work against the particular report of the vulnerability. So, that's why the following answer is not false.

4 0
3 years ago
Other questions:
  • Write the HTML to create a hyperlink to the named fragment designated by “top”.
    10·1 answer
  • Do you believe that technology has indeed flattened the world in terms of providing
    8·1 answer
  • A user on a home network needs to boost the signal of the wireless router. What should the user purchase to accomplish this?
    14·1 answer
  • can Results shown at the top of the Google search engine results page (SERP) always get high Needs Met ratings
    10·1 answer
  • E-mail messages, instant messages (IMs), or text messages sent and/or received within an organization a. are not included on a r
    9·1 answer
  • You are network administrator for an Active Directory forest with a single domain. Then network has three sites with one domain
    12·1 answer
  • Which professional can film projects hire as part of their budgeted costs? You can hire special ____ lawyers and include their f
    14·1 answer
  • Kyle has a notebook for each of his 5 classes. He puts 6 stickers on each notebook. There are 10 stickers on each sheet. How man
    11·2 answers
  • An engineer has reported that a printer is no longer working and needs troubleshooting. You have been informed that there is a p
    9·1 answer
  • Which string method returns true if the character is a lowercase letter?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!