1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgesh-ka [11]
3 years ago
12

What stage of software development incorporates planning to help make changes in the project plan based of reviews

Computers and Technology
1 answer:
larisa86 [58]3 years ago
8 0

Answer:

A

Explanation:

You might be interested in
Match the feature to its function.
kolbaska11 [484]

Answer:

Match the feature to its function.  The answers are as below:

1. Normal view the place where creating and editing occurs  

2. Notes view an area in which information for handouts can be added  

3. Slide pane the place where the slide order can be changed

4. Menu bar contains lists of commands used to create presentations  

5. toolbars provide rows of icons to perform different tasks  

Explanation:

It is the normal view where the editing and the creation of the slides occur. And it's the notes view where you can add the information for handouts. You can arrange the slides in the slide pane. And you can get a list of commands for creating the presentation in the Menu bar. Also, Toolbar is the rows of icons which helps in performing a various set of tasks. And all these are definitions and prove our above selections are correct.

6 0
3 years ago
True or False: You should only use your mirrors to see behind you when parallel parking.
mafiozo [28]
False. You should always look /check ou tall mirrors periodicly
8 0
3 years ago
Read 2 more answers
Dominick has been hired to design a network for Pirate Press. In a paragraph of no less than 125 words, discuss what he needs to
Luda [366]
If Dominic is to design a network for Pirate Press he would have to consider and know of the following:
a. Growing capital - he needs to know if the company's sales is growing or is in debt so that he would know what course of action he could take in case he pursues projects for the company. 
b. People/Team - the people/team working are the heart and soul of any company and knowing their specific needs and how they work is key to knowing how the company works as one unit 
c. Marketing of the product - he needs to know how the product sells in order for him to decide what other strategies he can incorporate to make the product more marketable to people.

3 0
3 years ago
Read 2 more answers
69.147.76.15 is an example of what?​
Rudiy27

Answer:

IP address.

Explanation:

An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

Hence, 69.147.76.15 is an example of an IP address.

In Computer networking, IP address are classified into two (2) main categories and these are;

1. Local (internal) IP address.

2. Global (external) IP address.

Generally, when this IP address such as 69.147.76.15 is translated by a domain name system (DNS), it is mapped to the domain name yahoo.com which is much more understandable or comprehensible to the end users.

5 0
3 years ago
The IP protocol (and UDP) are called "connectionless" and "unreliable." Describe what those two words mean in the context of dat
igor_vitrenko [27]

Answer:

Explanation:

In data communications, a protocol is <em>connectionless </em>if it describes communication between two devices in a network without first establishing or verifying establishment of some link (connection) between the two devices. In a connectionless protocol, data are exchanged between processes or devices without a prior check of whether the processes are ready to transmit data or not. In this type of protocol, there's no verification put in place to remember if these processes were or are in communication. Connectionless protocols are also called stateless protocols. Because connectionless protocol cannot be relied upon due to its lack of delivery-assurance policy, it is sometimes referred to as <em>unreliable protocol</em>. In other words, delivery of data packets is not guaranteed. An example of a connectionless protocol is the UDP (User Datagram Protocol).

However, if the protocol defines some checks to ascertain that there is first a connection between two communicating processes before beginning transmission, then, the protocol is <em>connection-oriented. </em>An example of this is the TCP (Transmission Control Protocol). Connection-oriented protocols are reliable since they ensure connection be made between processes before transmitting data packets.

A typical application of a connectionless/unreliable protocol is in the streaming of real time videos or voice communication where packets of data could be dropped and not resent.

An example of the connection-oriented/reliable protocol is analogous to making a telephone call where data packets (voice messages) are not sent until the receiver on the other end makes a connection.

6 0
3 years ago
Other questions:
  • You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination compute
    14·1 answer
  • How can volunteering to help plan a fundraiser for your team or club be a way to develop your strengths?
    10·2 answers
  • In a typical e-mail address, the "host" is user: which one of the following word processing features saves you the most time whe
    8·1 answer
  • PLEASE HELP what is the mechanical advantage of a wheel with a radius of 8.0 cm connected with a axle with a radius of 2.5 cm?
    12·2 answers
  • Write a C program (doublecopy) that allows a user to extract some part of an existing file (fileSource) and copy it twice to a n
    5·1 answer
  • Why would an information systems security practitioner want to see network traffic on both internal and external network traffic
    5·1 answer
  • give the difference between functional and functional tools in the middle of to the circle give importance​
    10·1 answer
  • In the program below, numA is a _____.
    8·2 answers
  • Which of the following is the responsibility of a computer support specialist? (A) conducting a usability study (B) providing sa
    6·2 answers
  • An employee is working on building a new computer application for a friend. For this purpose, he uses the software that is regis
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!