1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
posledela
3 years ago
13

4. When emergency changes have to be made to systems, the system software may have to be modified before changes to the requirem

ents have been approved. Suggest a model of a process for making these modifications that will ensure that the requirements document and the system implementation do not become inconsistent.
Computers and Technology
1 answer:
Vikentia [17]3 years ago
7 0

Answer:

Incremental model

Explanation:

Incremental model is the best modification in older version are feasible and can be easily managed.

Incremental model involves the technique of developing soft ware in which the product is designed implemented and tested in stages until the product is finished. The term finished here means the product as meet all its requirement.

This model entails development as well as maintenance.

You might be interested in
CHALLENGE ACTIVITY
julia-pushkina [17]

Answer:

avg_owls=0.0

num_owls_zooA = int(input())

num_owls_zooB = int(input())

num_owls_zooC = int(input())

num_zoos = 3

avg_owls = (num_owls_zooA + num_owls_zooB + num_owls_zooC) / num_zoos

print('Average owls per zoo:', int(avg_owls))

Explanation:

There is a problem while you are trying the calculate the average owls per zoo.

As you may know, in order to calculate the average, you need to get the total number of owls in all the zoos, then divide it to the number of zoos. That is why you need to sum num_owls_zooA + num_owls_zooB + num_owls_zooC and divide the result by num_zoos

Be aware that the average is printed as integer value. That is why you need to cast the avg_owls to an int as int(avg_owls)

6 0
3 years ago
A network on the internet has a subnet mask of 255.255.240.0. what is the maximum number of hosts it can handle
Lera25 [3.4K]
It is a class B network, so for a class B network, the upper 16 bits form the network address and the lower 16 bits are subnet and host fields. Of the lower 16 bits, most significant 4 bits are 1111. This leaves 12 bits for the host number. So, 4096(2^12) host address exists. First and last address are special so the maximum number of address is 4096-2=4094.
7 0
4 years ago
What shooting position is commonly used when hunting with a shotgun?
amid [387]
Standing well for me I never miss a shot in that position

6 0
4 years ago
Read 2 more answers
_____ is the software that protects you computer from harmful files, Trojan horses, and worms.
Bumek [7]
I think it's antivirus because Antivirus means to protect your computer from a deadly virus
4 0
4 years ago
Read 2 more answers
How can social media give you knowledge
cupoosta [38]
Social Media can you knowledge by most users on Social Media spreading their own knowledge.
5 0
3 years ago
Other questions:
  • The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .
    13·1 answer
  • Which of the following situations represent(s) resource scarcity? I. Rapidly growing economies experience increasing levels of w
    9·1 answer
  • You can add a new slide to a presentation by
    11·1 answer
  • SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA. Assume that the classes listed in the Java Quick R
    9·1 answer
  • For a new version of processor, suppose the capacitive load remains, how much more energy will the processor consume if we incre
    12·1 answer
  • What type of computer system can be found in the computer lab at school?
    14·1 answer
  • Write down the functions of network layer in your own words.ASAP
    14·1 answer
  • What is computer forensics? Where and how would an IT auditor use thisresource?
    12·1 answer
  • Mike logged into a shopping website and entered his username and password. Which protocol will the website use to verify his cre
    15·1 answer
  • if a college wanted to provide its students with access to a network that could be used in any of the buildings across campus, i
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!