1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maslowich
3 years ago
8

Which model involves the creation of data and process models during the development of an application?

Computers and Technology
2 answers:
guapka [62]3 years ago
7 0
It seem like there are information missing on the question posted. Let me answer this question with all I know. So here is what I believe the answer is, <span>the creation model involves the creation of data and process models during the development of an application.</span>

Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.
butalik [34]3 years ago
6 0

Waterfall was wrong for this question I know it isn't the right answer but I hope this helps

You might be interested in
What direction would a sprite go if you constantly increased its x property? Your answer What direction would a sprite go if you
Korvikt [17]

Answer:

decrease x property,It would go left

decrease y property, it would go down

yes

Explanation:

8 0
3 years ago
Which are among the ways you can use bitlocker encryption? (choose all that apply?
igor_vitrenko [27]
There is a lot of ways that you can use the bit locker encryption. Some are when you are authenticating your computer using a TPM. Or when you are authenticating your account using a USB Flash drive, and most on the phones authentication through text messages and all.
3 0
3 years ago
BRIANLIEST!!!!!!!!!!!!!!!!
oksano4ka [1.4K]

Answer:

First Line indent

Explanation:

should be correct

4 0
3 years ago
Read 2 more answers
Smartart and shapes are useful tools because they allow you to
charle [14.2K]
Organize data within a document..draw any shape you wants within a document... easily create manipulate shapes within a document. hope this helps
4 0
3 years ago
In which type of attack do you get malicious code in links from seemingly reliable websites?
natali 33 [55]

I think it is C. cross-site scripting

6 0
3 years ago
Other questions:
  • Refer to the exhibit. A web designer calls to report that the web server web-s1.cisco is not reachable through a web browser. Th
    15·1 answer
  • If you print a document with red green or blue underlines will they show up on printed pages
    14·1 answer
  • What are some good websites i can use to test my knowledge?
    11·2 answers
  • List and describe the tools for all the main stages of app/application development.
    11·1 answer
  • Project using simple formulas
    15·1 answer
  • Why does my hp computer keep freezing when i move it?
    10·1 answer
  • If you do not want to keep a change made by the autocorrect feature, you can click the ____ button on the auto correction option
    12·1 answer
  • A gas furnace has an efficiency of 75% . How many BTU will it produce from 1000 BTU of natural gas​
    14·2 answers
  • For the following C code assume k and m are passed in x3 and x4 respectively, while result is returned in x4. Compile this code
    14·1 answer
  • Write a function called changeCharacter that takes three parameters – a character array, its size, and the replacement character
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!