1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavel [41]
3 years ago
5

Why is continual user involvement a useful way to discover system requirements? Under what conditions might it be used? Under wh

at conditions might it not be used?
Computers and Technology
1 answer:
True [87]3 years ago
7 0

Answer:

continual user involvement gives the flexibility to analyze the requirements in right direction. because there is continuous meetings with the end user and he can provide right direction or avoids wrong interpretation of the requirement

Explanation:

continual user involvement is useful when we are following agile methodology where we are building complex systems. it is not useful for simple sytems and following waterfall methodology

You might be interested in
Who is father of computer <br>​
jarptica [38.1K]

Answer:

Charles Babbage was considered to be the father of computing after his concept, and then later the invention of the Analytical Engine in 1837. The Analytical Engine contained an ALU (arithmetic logic unit), basic flow control, and integrated memory; hailed as the first general-purpose computer concept.

PLEASE MARK ME AS BRAINLIEST :)

6 0
4 years ago
Define the terms candidate key and primary key. Explain the difference between a primary key and a candidate key.
Shkiper50 [21]

Explanation:

Both Primary Key and Candidate Key are the attributes that are used to access tuples from a table. These (Primary key and Candidate key) are also can be used to create a relationship between two tables.

  • A Candidate Key can be any column or a combination of columns that can qualify as a unique key in the database. Each Candidate Key can qualify as a Primary Key.
  • A Primary Key is a column or a combination of columns that uniquely identify a record. The primary key is a minimal super key, so there is one and only one primary key in any relationship.

<em> The main difference between them is that a primary key is unique but there can be many candidate keys. </em>

I hope you find this information useful and interesting! Good luck!

5 0
4 years ago
The Loanable Funds Market is built very similar to the Supply &amp; Demand Model. The Loanable Funds Market relates ____________
lawyer [7]
A should be the right answer
3 0
3 years ago
What does it mean when the lottery machine says function suppressed after scanning a ticket
WARRIOR [948]

When a machine  says function suppressed after scanning a ticket, it implies that you have won some certain amount.

<h3>What is lottery  wins?</h3>

This term connote that a person has  a winning ticket in a lottery that is often owned by a government.

Note that  if a winning ticket is scanned, the terminal often shows a message just for you and that suppress function implies  that your the ticket has won something.

Learn more about lottery  from

brainly.com/question/9216200

6 0
2 years ago
Java uses ____ to implement method lookup.A) a jump tableB) an inheritance treeC) restricted accessD) polymorphism
sashaice [31]

Answer:

D) polymorphism

7 0
4 years ago
Other questions:
  • Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa
    5·1 answer
  • What word can you spell with the letters e, e, a, m, g, t, and k?
    10·1 answer
  • Which command group does a user need to access the Formula dialog box?
    11·1 answer
  • Which type of business is best for Juanita to start? a corporation, because she needs a large investment to get started a sole p
    13·2 answers
  • You work on a team whose job is to understand the most sought after toys for the holiday season. A teammate of yours has built a
    11·1 answer
  • A function ________ contains the statements that make up the function.
    5·1 answer
  • Explain the difference between good and bad table structures. How do you recognize the difference between good and bad structure
    14·1 answer
  • What is the empty space inside the character 'O' called?
    12·1 answer
  • Analyze the code and identity the value of variable a,b and c after the code execution. int a=40, b=50, c=60; if(! (a&gt;=40)) b
    15·1 answer
  • Gnome ____ are small programs available on the gnome panel that are designed to give you quick access to useful applications.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!