1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Radda [10]
4 years ago
13

Under extreme programming, ________ and ________ are intimately related parts of the same process

Computers and Technology
2 answers:
Inessa05 [86]4 years ago
8 0
The answer to this question is: coding and testing
Extreme programming is a software development methodology that aim to improve software quality by measuring whether the technology can be used to fulfill customer's requirement.
To actually get somethings that is accepted by the customers, various coding and testing the software will be done constantly
cluponka [151]4 years ago
4 0
Coding and testing is the answer.
You might be interested in
In the past, data was transferred from OTLP databases to data warehouses periodically, say once a month or even once a week. Now
Vinvika [58]

Answer:

Active is the correct answer of this question.

Explanation:

In active database is a database that contains a tournament-driven infrastructure that can adjust to circumstances within the database and beyond. Alternate  include safety tracking, contacting, collecting and approving information.A move is towards active or real-time data storage so that applications can evaluate and help decision making use of current data.

3 0
4 years ago
The computer-like model used to describe the way humans encode, store, and retrieve information is the ________ model.
FinnZ [79.3K]

Answer:

Information processing model

<em>Hope it helps!</em>

3 0
2 years ago
What are the possible consequences of intentional virus setting?
natali 33 [55]

<u>The possible consequences of intentional virus setting:</u>

Virus is nothing but desktop or laptop or tablet OS has to do certain process as on its own which diverse other  to different process  such us stealing the data from desktop or laptop or tablet and making slow the performance of desktop and laptop  and tablet.

To avoid or protect the computer there are two type of antivirus.

  • On desktop or tablet or laptop. (It is called resident firewall).
  • Internet gateway. (It is called firewall)

So company create virus and to rectify they make money of that process.

To protect our desktop or laptop or tablet from virus we are protected with law. In case due to virus attacked our laptop or desktop or tablet Is effected we can fine the or sent to jail by law.

3 0
3 years ago
Find the greatest common factor of 48 and 36.​
gregori [183]

Answer:

Hello, The prime factorization of 48 is: 2 x 2 x 2 x 2 x 3. And The  prime factorization of 36 is: 2 x 2 x 3 x 3.

Explanation:

The prime factors and multiplicities 48 and 36 have in common are: 2 x 2 x 3.

2 x 2 x 3 is the "GCF" of 48 and 36.

"GCF"(48,36) = 12.

7 0
3 years ago
How many people think that online classes suck and they should stop all classes
hammer [34]

Answer:

Me

Explanation:

Its really just a waste of time since I have no motivation to do any of it , so I just use this site. Though I can't really do that on a DBQ for my AP class , so I am just going to wither away now.

3 0
3 years ago
Other questions:
  • The smallest unit of storage in the following list is a
    7·1 answer
  • An increase in the Money Supply will increase the Aggregate Price Level and will also increase which of the following?
    14·1 answer
  • Define
    15·1 answer
  • Given the following code fragment and the input value of 4.0, what output is generated?
    8·1 answer
  • PLEASE HELP!!!
    12·1 answer
  • If an individual receives 1.8 mGy while standing 4 ft from a source of radiation for 2 minutes, which of the following option(s)
    9·1 answer
  • If you used a peach as a model of an animal cell, what would the peach's skin represent? A.nucleus B.cell wall C.cytoplasm D.cel
    10·2 answers
  • The Publisher-Subscriber design pattern is used to create __________________ communication between software objects and is used
    13·1 answer
  • In the program below, numA is a _____.
    8·2 answers
  • Read the steps in the process of making a video.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!