1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
babunello [35]
3 years ago
11

List and describe the tools for all the main stages of app/application development.

Computers and Technology
1 answer:
Liono4ka [1.6K]3 years ago
8 0
<span>stuff like -Information Gathering -Planning -Design -Development -Testing and Delivery <span>Maintenance hope that helped.</span></span>
You might be interested in
HELP ASAP PLZZZZZ
musickatia [10]

Answer:

third one

Explanation:

3 0
3 years ago
In ipv4 addressing, an ip address whose first octet is in the range of 192–223 belongs to a class ____ network.
pishuonlain [190]

I guess the correct answer is class C network.

In IPv4 addressing, an IP address whose first octet is in the range of 192–223 belongs to a class C network.

4 0
3 years ago
Linotype is similar to letterpress since both utilize lead type. The difference is that in a linotype, the type is cast into ful
Maru [420]

Answer:

I think it would be.

A-Metal-cast pouring system

<h2>I hope it helps</h2>

8 0
4 years ago
Summarize the role of technology in efforts to explore space.
Georgia [21]
The role of technology in efforts to explore space could be argued to say that it has helped us to discover many different planets. An IS is a space station that helps us do stuff!!
6 0
3 years ago
3. Why did Steve Jobs and Steve Wozniak start working on developing computers?
LenaWriter [7]
Jobs was less hands-on when it came to developing computer software, and instead focused on design, advertising and talking to press, Wozniak said. “One thing he wanted was to somehow be important in the world, though he didn't have the academic or business, background, he had me,” he said.
4 0
4 years ago
Other questions:
  • A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itse
    15·1 answer
  • 9. The best way to insert an existing Excel chart into a document is to A. use the Object command. B. click the Insert tab and c
    6·2 answers
  • Express the following Boolean function using only the NOT and the AND operation
    6·1 answer
  • Addition and subtraction are considered to be ____ operations performed by a computer.
    7·1 answer
  • What Active Directory object enables an administrator to configure password settings for users or groups that are different from
    9·1 answer
  • In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism
    15·1 answer
  • (1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term e
    10·1 answer
  • I need to create a method named "root positive". which will either print the square root of the number passed to it or if the nu
    13·1 answer
  • Which is true regarding pseudocode?
    15·2 answers
  • is a measurement that quantifies how much information can be transmitted over the network. A. Memory B. DMZ C. Bandwidth D. Clou
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!