1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brrunno [24]
3 years ago
6

Really need help with these PLZ

Computers and Technology
1 answer:
snow_lady [41]3 years ago
4 0

1. B joint application design

2. A it is necessary to write most of the new code manually

3. D since users have been involved in the pro typing, managers can be confident that the system can handle large numbers of users

4. B extreme programming

5. C code that is produced using OOD is easy to secure

6. A more testing is preferable to less testing

7. C object-oriented development

8. D component-based development

9. A object

10. B the code can only represent information as objects

You might be interested in
As a Waterfall project manager, your goal is to minimize any changes that could lead to scope creep. You want to protect your te
Harrizon [31]

The necessary things that should be done to avoid a project scope creep include documenting the project requirements and setting up change control processes.

The scope of a project simply means the work that is required in order to complete a project. On the other hand, project scope creep means the occurrence that happens when changes are made to the scope without a change request.

To avoid project scope creep, it's important to document the project requirements, set up changes in control processes, and have a clear project schedule.

Learn more about projects on:

brainly.com/question/4853153

8 0
3 years ago
Help Me Please. I'm Begging you
Luba_88 [7]

Answer:

d and b can't see the last ones answer so im guessing this is what you needed.

Explanation:

8 0
3 years ago
Unemployment can be viewed as
vodomira [7]
Really bad for you :(

6 0
4 years ago
In determining where to store specific data in a(n) centralized DBMS, factors such as communications cost, response time, storag
natita [175]

In determining where to store specific data in a(n) centralized DBMS, factors such as communications cost, response time, storage cost, and security are key considerations is True.

True

<u>Explanation:</u>

If database is centralized (DBMS) as database administrator has kept database server on by 24 X 7. If an organization office is spread over many countries, centralized the database is good advice.

Database administration has monitored the database access in and out transaction on the database.

Since it is centralized database, it is cost effective rather providing database server in office in organizations  and later it synching  to centralized database on period schedule or end user ( IT department)  in each office has to execute the period schedule then their requirements

Response time from and to on centralized database is count how fast the system operates the database.

Since it is database is centralized storage cost is reduces as expenses in the organization.

Security on centralize database server is very important to protect from hackers.

3 0
3 years ago
Command create database in oracle database ::((
12345 [234]

Answer:

kdkskskiisidiodoosooddodod

6 0
3 years ago
Other questions:
  • 24 bit or 16 million colors is often called?
    7·1 answer
  • What is the point of completing a value assessment while searching for a career
    11·1 answer
  • Which of the following can be considered beta testing? A programmer at Linus Systems checks the integration of multiple modules
    14·1 answer
  • Which of the following types of network can only be accessed by members within a private organization?
    5·1 answer
  • Which quality determines an individual's ability to be open to changes and complete tasks in an ever-changing work environment?
    12·1 answer
  • What is a router?
    9·1 answer
  • When a web page author includes meta keywords, like sex, that have little to do with the information on the page, the author is
    11·1 answer
  • 4. Why does Hancock believe that our communication online is more honest than we might<br> expect?
    15·2 answers
  • Explain four sitting postures in a computer laboratory​
    9·1 answer
  • Collection activities acquire and extract data from the operational environment such that Processing and Exploitation can conver
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!