1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KIM [24]
3 years ago
12

Describe the following software process models using your own words .Your explanation should also provide an example of a softwa

re project that would benefit much from each model than using most of the alternative processes. Justify your answer.
f) Agile development
Computers and Technology
1 answer:
avanturin [10]3 years ago
6 0

Answer:

Agile Development is a software methodology which is iterative.

Explanation:

Agile Development is a software methodology which is iterative.it is more useful to develop complex systems where regular touch up meetings/calls happen with the business to showcase their progress and ensure that the application is going in right direction. Compared to Waterfall ,where all phases are in sequence it is more recommended to design and develop complex software projects.

Agile Development is useful for complex software projects where we regularly in touch with the client and take our design and development decisions based on client feedback

Waterfall methodology is useful for simple projects where all the requirements are clear at the beginning and no more changes in requirement are required

You might be interested in
WHAT ACTIONS CAUSE SPAM ON LINKEDIN?
klio [65]

Answer:

LinkedIn has a very smart algorithm, and it has a very strict policy against spammers. Back in 2014, it deleted millions of accounts that were causing spam on LinkedIn.  

Spam occurs:  

1. When you send bulk of connect requests in a short time  

2. When you send irrelevant messages to prospects  

3. When you Perform overactivity  

4. When you use LinkedIn automation tools  

5. When you send spammy and sales-y messages  

All these actions cause spam on LinkedIn, and it immediately takes action against you by restricting your account temporarily or permanently.

4 0
3 years ago
Effective communication skills are a desirable workplace skill
OLga [1]
Yes. If there is no effective communication in the workplace then nothing is going to be done.
4 0
3 years ago
When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack"
kumpel [21]

<em>The answer is : He must consult with a lawyer. </em>

<em>Hacking is considered illegal and in other countries, it is punishable by law. Hacking is gaining unauthorized access to a network. Even when someone is giving you permission to do it, it is still wrong and illegal. Therefore, you must know of your rights and make all the party involved to signed an agreement to save yourself.</em>

8 0
3 years ago
In a social networking site your personal information is listed under your?
abruzzese [7]
Profile? Perhaps... If you go on social media sites like Facebook it's typically on your profile, right?
3 0
4 years ago
Read 2 more answers
When did economies begin?
Pavlova-9 [17]
They began in ancient times the babylons started trading
6 0
4 years ago
Read 2 more answers
Other questions:
  • Why would "ExpirationDate” be a poor choice as a primary key?
    11·1 answer
  • Which element would the search element be compared to first, if abinary search were used on the list above?
    6·1 answer
  • Help meee pleaseeee
    5·1 answer
  • Does anyone know a good reason WHY to change your username.
    5·1 answer
  • The term Linux Intrusion Detection System ( LIDS) refers to a command that allows an administrator to run processes as root with
    5·1 answer
  • Compare the graphs. Find the value of h, k, or a.
    7·1 answer
  • How would you design an adaptive environment for people who are blind?
    10·1 answer
  • What is computer software​
    9·1 answer
  • Of the following field which would be the most appropriate for the primary key in a customer information table?
    5·1 answer
  • Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!