1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
earnstyle [38]
3 years ago
10

Discuss the software development methodology you would use for developing a software product for insurance agents, and state val

id reasons for choosing this particular model.
Computers and Technology
1 answer:
nadya68 [22]3 years ago
4 0

Answer:

It depends on what the company will be willing to use and it also depends on their budget

Explanation:

You might be interested in
How to find no of Distinct triangles in a polygon?
8_murik_8 [283]
Input : N = 6
Output : 6 2
The image below is of a triangle forming inside a Hexagon by joining vertices as shown above.
The triangle formed has two sides (AB and BC) common with that of a polygon. Similarly BC and
CD can make one triangle. With this, we can say that there will be a total of 6 triangles possible
having two sides common with that of a polygon. The second image of a hexagon,
a triangle is formed with no side common with that of a polygon.
There will be just 2 triangles possible, BFD and ACE.


Triangle with two side common and no side common of the Hexagon

Number of triangles formed are 6 and 2 with two side common and with no side common respectively.
Input : N = 7
Output : 7 7
7 0
3 years ago
As computer words get larger and larger, there is a law of diminishing returns: the speed of execution of real application progr
otez555 [7]

Answer:

Explanation:

I can pick a reason out of many, and that would be the software. The fact is that, even as they are computers and machines, the softwares themselves have particular design cap. A software that was designed for systems with a narrow word size will most likely have issues as more and more words are used on it. I don't know if you understand what I'm saying, everything has a cap, once that particular meter is approaching, systems tend to slow onwards.

When it comes to the hardware part using the same technology, it might take a longer time to do basic arithmetic on larger inputs.

When you're under using a system, it tends to have a lot of space, excess, to perform its functions, but as soon as it is nearing its limit, it will slow down so as to accommodate all the processes at once.

3 0
3 years ago
Last bittttt of points
nevsk [136]

Answer:

THANKSSS..!!! Be safe

Explanation:

6 0
3 years ago
What is the largest computer file size, megabyte , gigabyte, terabyte
STatiana [176]

The terabyte is the largest computer file size because it has 1024 gigabytes each of which has 1024 megabytes. Therefore, the the terabyte can be subdivided into megabytes or gigabytes.

3 0
3 years ago
Read 2 more answers
You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy o
Katen [24]

Answer:

Full

Explanation:

You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy of all data is available with a single set of media. However, it should take minimal time to restore data. Which of the following would be the <u>Full</u> .

3 0
3 years ago
Other questions:
  • I have Mac(the last version installed) and I use Wine (application for using windows files, programmes on mac) but I have some p
    6·1 answer
  • If I want to make it look like slide number one is turning a page to slide number two, what effect needs to be applied?
    13·1 answer
  • Answer these two if u can❤️
    5·2 answers
  • You have just created a one-way incoming trust in your domain for an external domain used by a partner company to allow your dom
    11·1 answer
  • An installed theme can be applied by clicking on a theme in the themes group on the ____ tab.
    7·2 answers
  • X = 19 y = 5 print (x % y)
    11·1 answer
  • The program asks the user to enter the time the call is made (day, evening, or night) and the duration of the call (a number tha
    5·1 answer
  • provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,
    11·1 answer
  • Any Danganronpa fans around here? I'm bored.
    13·2 answers
  • Sandra has composed a draft of her essay in Microsoft Word. She now wants to revise the essay. Which tool can she use to store t
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!