1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sineoko [7]
1 year ago
7

Traditional methods of collecting systems requirements include: a. rapid application development. b. prototyping. c. interviews.

d. joint application design. e. agile methodologies.
Computers and Technology
1 answer:
diamong [38]1 year ago
3 0

Answer:

interviews

Explanation:

because the designer gets to directly interact with the customer who knows exactly what they want.

You might be interested in
________is one color shade gradually progressing to another shade of the same color or one color progressing to another color.
posledela

Answer:

Gradient fill

Explanation:

A gradient fill is a visual effect that makes a three dimensional color look by mixing one color shade gradually progressing to another shade of the same color or one color progressing to another color. for example a dark red progressively changing to light red or red progressively changing to blue.

8 0
3 years ago
Why is wider channel bandwidth good?
Nookie1986 [14]

Answer:

The wider channel bandwidth is efficient and good as it help in increasing the speed of the transmission. Due to the wider channel of the bandwidth it also lead to consuming less energy of the battery and make cost effective.

Due to the wider bandwidth, the number of clients can easily share and transfer the data in the channel and also make the transmission complete.

If the channel of the bandwidth is double then, the single transmission can easily carry more data. Hence, it also lead to double the speed of the transmission.

7 0
3 years ago
Which tab is used to insert a hyperlink onto a slide
Roman55 [17]
The tab used to instead a Hyperlink into a slide is the Insert tab under the “Links” group.
5 0
2 years ago
Read 2 more answers
A structure, in C, has been given by: struct MYSTRUCT { char buf[15] shorts S int i; } * Select the proper keywords in the prope
vodka [1.7K]

Answer:

MYSTRUCT myStruct[8]; // statemnt to create an array of struct variables

myStruct[3].buf[4] // statement to access the fourth element of the array of the struct variables.

struct * MYSPTR = &myStruct; // This statement creates a pointer.

To dereference and access the S variable of the struct data structure in the array;

(*MYSPTR).S and its shorthand notation MYSPTR -> S

Explanation:

A structure is a data structure in C language that is used to hold descriptive data of an object. The keyword struct is used to create the structure. An array of struct holds instances of a struct variable, where each struct can be accessed using the regular array indexing and the variables of the structs in the array can be accessed using dot notation.

7 0
2 years ago
¿Como viaja la información? en la tecnologia
Simora [160]

Answer:

Todavía estoy aprendiendo español, por lo que las palabras podrían estar mal de alguna manera.

Explanation:

El seguimiento de vuelos, las agencias de viajes en línea y el uso de las redes sociales en línea son todas formas de tecnología de viajes que pueden ayudar a las personas a planificar viajes. La tecnología de viajes incluye sistemas de reserva por computadora, así como aplicaciones mucho más amplias que son cada vez más importantes.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Software license infringement is also often called software __________.
    11·2 answers
  • What component of effective feedback is demonstrated by giving examples of what an employee is doing right instead of just prais
    14·2 answers
  • Write a program that prints all the numbers from 0 to 6 except 3 and 6. Expected output: 0 1 2 4 5
    13·1 answer
  • Which of the following hacker attacks against wireless networks are virtually undetectable?
    12·1 answer
  • What do you call an unsolicited email message that masquerades as coming from a legitimate sender, and attempts to get you to di
    11·1 answer
  • Many businesses use robotic solutions. Which department of the food and beverage industry uses robotic solutions on a large scal
    10·2 answers
  • Assume that a 5 element array of type string named boroughs has been declared and initialized. Write the code necessary to switc
    5·1 answer
  • How many times do you return after the dateline ?
    12·1 answer
  • Complete the following sentence.
    12·1 answer
  • Print numbers 0, 1, 2, ..., userNum as shown, with each number indented by that number of spaces. For each printed line, print t
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!