1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir79 [104]
3 years ago
5

. When a system isdelivered over time, with each delivery (release) adding tothe

Computers and Technology
1 answer:
dexar [7]3 years ago
5 0

Answer:

A. Incremental Development

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

The answer to this question is Incremental Development, this is when the development of the system is implemented little by little as time goes on. On the other hand phase development is when a development cycle is rolled out in phases such as the brainstorming phase, Construction phase, marketing , and roll out phase. Since this development doesn't contribute to the system's functionality it is not the correct answer.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
Meta is a penetration testing engineer assigned to pen test the security firm's network. So far, she cannot tunnel through the n
Arte-miy333 [17]

In order to gain repeated and long-term access to the network system in the future, Meta should perform privilege escalation.

A penetration test is also referred to as pen test or ethical hacking and it can be defined as a cybersecurity technique that simulates a cyber attack against a user's computer system, in order to identify, test and check for exploitable vulnerabilities in the following:

  • Web software
  • Host device
  • Network

Hence, a pen test avails an end user the ability to exploit a weakness and potential security threats during vulnerability assessments of the system.

In Cybersecurity, privilege escalation can be defined as a process that involves the exploitation of a design flaw, software bug or configuration setting in a network, so as to gain repeated and long-term (elevated) access to the network or software application in the future. Thus, Meta should perform privilege escalation to enable her gain repeated and long-term access to the network system in the future.

Read more: brainly.com/question/24112967

7 0
3 years ago
which of these paste options is commonly available from the paste options button? A> use the destination them. B. keep the em
Anuta_ua [19.1K]
The correct option is D, PASTE AS CONTENT ONLY.
The paste option is the one which allows one to copy the content in a particular page and put it another space or page. The paste command has many options depending on the software that one is using, whether it is word, excel or power point. These options allow one to customize the copied and pasted content. One of the options that are usually available under paste option is paste as content only.
6 0
4 years ago
Read 2 more answers
What typically happens by default when a file is double clicked in Microsoft Windows?
Ket [755]
<span>When a file is double clicked in Microsoft Windows typically the file opens or executes.</span>
For many people the<span> time in which they have to do two quick clicks of the left mouse button is too short. </span>
There is an option to adjust<span> the </span>double-click speed.<span> This can be done on the Buttons tab, under </span>Double-click speed.
3 0
3 years ago
This program will store roster and rating information for a soccer team. Coaches rate players during tryouts to ensure a balance
Simora [160]

Answer:

// Scanner class is imported to allow program receive user input

import java.util.Scanner;

// class is defined

public class PlayerRoster {

   // main method that begin program execution

  public static void main(String[] args) {

   // Scanner object scan is defined

     Scanner scan = new Scanner(System.in);

   // multi-dimensional array to hold the jersey number and rating

     int[][] players = new int[5][2];

   // boolean flag to keep program alive

     boolean keepAlive = true;

   // the user input is declared as input of type char

     char input;

     

   // for loop that receive 5 player jersey number and ratings

   // it assigns the received input to the already initialized array

     for (int i = 0; i < 5; i++) {

        System.out.println("Enter player " + (i+1) + "'s jersey number: ");

        players[i][0] = scan.nextInt();

        System.out.println("Enter player " + (i+1) + "'s rating: ");

        players[i][1] = scan.nextInt();

        System.out.println();

     }

   // a blank line is printed

     System.out.println();

   // a method is called to display players array

     outputRoster(players, 0);

     

   // while the flag is true

   // display the Menu by calling the outputMenu method

     while (keepAlive) {

        outputMenu();

       // user input is assigned to input

        input = scan.next().charAt(0);

       //  if user input is 'q' then program will quit

        if (input == 'q') {

           keepAlive = false;

           break;

        }

       //  else if input is o, then outputRoaster is called to display players

        else if (input == 'o') {

           outputRoster(players, 0);

        }

       //  else if input is 'u', then user is allowed to edit a player rating

        else if (input == 'u') {

           System.out.println("Enter a jersey number: ");

           int jerseyNum = scan.nextInt();

           System.out.println("Enter a new rating for the player: ");

           int newRating = scan.nextInt();

           for (int l = 0; l < 5; l++) {

              if (players[l][0] == jerseyNum) {

                 players[l][1] = newRating;

              }

           }

        }

       //  else if input is 'a', user is allowed to add a new rating

        else if (input == 'a') {

           System.out.println("Enter a rating: ");

           int rating = scan.nextInt();

           outputRoster(players, rating);

        }

        // else if input is 'r', user is allowed to replace a player

        else if (input == 'r') {

           System.out.println("Enter a jersey number: ");

           int jerseyNum = scan.nextInt();

           boolean exists = true;

           for (int l = 0; l < 5; l++) {

              if (players[l][0] == jerseyNum) {

                 System.out.println("Enter a new jersey number: ");

                 players[l][0] = scan.nextInt();

                 System.out.println("Enter a rating for the new player: ");

                 players[l][1] = scan.nextInt();

              }

           }

           

        }

     }

     

     return;

  }

 

// this method take two parameters, players and min

// it then returns player with ratings greater than min

  public static void outputRoster(int[][] players, int min) {

     System.out.println(((min>0) ? ("ABOVE " + min) : ("ROSTER")));

     int item = 1;

     for (int[] player : players) {

        if (player[1] > min) {

           System.out.println("Player " + item + " -- Jersey number: " + player[0] + ", Rating: " + player[1]);

        }

        item++;

     }

     System.out.println();

  }

 

// outputMenu method to display the program menu

  public static void outputMenu() {

     System.out.println("MENU");

     System.out.println("u - Update player rating");

     System.out.println("a - Output players above a rating");

     System.out.println("r - Replace player");

     System.out.println("o - Output roster");

     System.out.println("q - Quit\n");

     System.out.println("Choose an option: ");  

  }

}

Explanation:

The program is written in Java and it is well commented.                                          

5 0
3 years ago
What term identifies the physical interface between a computer and its peripherals?
antoniya [11.8K]
(B. Hardware), Hardware is physical components, Software are the programs in the computer.
3 0
3 years ago
Other questions:
  • There is a colony of 8 cells arranged in a straight line where each day every cell competes with its adjacent cells(neighbour).
    11·1 answer
  • Explain the nature of documents that can be suitable for mergin
    12·1 answer
  • Which one of the following statements is correct? a. Web browsers cannot function without cookies. b. Cookies are text files and
    9·1 answer
  • The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future
    13·1 answer
  • What should you do if you forget your root password for MySQL?
    13·1 answer
  • Power point presentation make use of pages known as
    9·2 answers
  • Web design and development tools
    13·1 answer
  • Is Invader Zim gonna come back?
    7·1 answer
  • A ____ is a share of ownership in a company
    11·2 answers
  • 8. Give regular expressions with alphabet {a, b} for
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!