1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KIM [24]
3 years ago
12

Describe the following software process models using your own words .Your explanation should also provide an example of a softwa

re project that would benefit much from each model than using most of the alternative processes. Justify your answer.
f) Agile development
Computers and Technology
1 answer:
avanturin [10]3 years ago
6 0

Answer:

Agile Development is a software methodology which is iterative.

Explanation:

Agile Development is a software methodology which is iterative.it is more useful to develop complex systems where regular touch up meetings/calls happen with the business to showcase their progress and ensure that the application is going in right direction. Compared to Waterfall ,where all phases are in sequence it is more recommended to design and develop complex software projects.

Agile Development is useful for complex software projects where we regularly in touch with the client and take our design and development decisions based on client feedback

Waterfall methodology is useful for simple projects where all the requirements are clear at the beginning and no more changes in requirement are required

You might be interested in
Write a loop to print 10 to 90 inclusive (this means it should include both the 10 and 90), 10 per line.​
Masja [62]

Answer:

c = 0

for x in range(10,91):

   print(x, end=" ")

   c = c + 1

   if c>=10:

       print(" ")

       c=0

Explanation:

8 0
3 years ago
An office is facing a network issue. The technicians have determined that a virus affected the manager's computer. However, they
Margarita [4]

Answer:

The correct answer is: Bus Topology.

Explanation:

Bus Topology is a network setup where all the computers are connected to a single cable. Servers can connect easily to the network but it implies everyone connected has access to what everybody in the same network is doing. Security options are limited to no-existent under this topology.

In that case, if technicians cannot isolate a virus infection problem, it is the result of working with a bus topology where more than one computer is connected to the same network and every terminal has access to each terminal.

7 0
3 years ago
Who is the father of computer?​
bagirrra123 [75]

Answer:

The first automatic digital computer has been designed by the English mathematician and inventor Charles Babbage. Babbage developed the Analytical Engine Plans for the mid-1830s.

Explanation:

  • Babbage has developed the concept of a digital, programmable computer and was a mathematician, philosopher, inventor, and mechanical engineer.
  • Some regard Babbage as a "computer father"
  • The inventing of its first mechanical computer, the difference engine, is attributable to Babbage, which eventually resulted in more complex electronic designs, although Babbage's Analytical Engine is the main source of ideas for modern computers. He was described as the "prime" among the numerous polymaths of his century by his varied work in another field.
7 0
2 years ago
What are the limits of hashing and verifying that files haven’t changed?
earnstyle [38]

The hashing function can take any number of key-value pairs and there is no specific limit to it.

<h3>What is hashing?</h3>

Hashing is a file-based algorithm for producing a fixed-length bit string value. A file is essentially a collection of data blocks. The length of the data is reduced by hashing to a fixed number or key that represents the original string.

When hashing is employed, the hash function may plot all of the keys and values to what the real size of the table is, demonstrating that the hashing function can take any number of key-value pairs with no restriction.

However, if the passwords are hashed in encryption, recovering the passwords is extremely difficult.

Thus, the hashing function can take any number of key-value pairs and there is no specific limit to it.

Learn more about the hashing here:

brainly.com/question/13106914

#SPJ1

5 0
2 years ago
Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two
natka813 [3]

Answer:

tyhgfrd

Explanation:

8 0
3 years ago
Other questions:
  • When desktop publishing software can interact with another software program, the two are said to
    6·1 answer
  • What is life all about?
    15·2 answers
  • A four-year old laptop will not boot and presents error messages on screen. You have verified with the laptop technical support
    11·1 answer
  • What are the core scripting and coding technolies used to build ai platforms?
    14·1 answer
  • What are the first and the last physical memory addressesaccessible using
    10·1 answer
  • Write a function named times_ten. the function should accept an argument and display the product of its argument multiplied time
    13·1 answer
  • the microsoft excel application is a _____ program. database word-processing spreadsheet desktop-publishing
    8·1 answer
  • From the following list choose all the tasks an operating system performs.
    5·2 answers
  • Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not
    8·1 answer
  • There are many reasons to convert to the decimal numbering system. Select the best answer. When checking numeric values in compu
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!