1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
3 years ago
11

In the Unified Process (UP), related activities are grouped into UP ____. a. Services b. Disciplines c. Cycles d. Practices

Computers and Technology
1 answer:
Paha777 [63]3 years ago
6 0

Answer:

b. Disciplines

Explanation:

The Unified Process (UP) is a type of development framework that repeats itself and can be customized and used for several different variations of the same underlying process. In the Unified Process (UP), related activities are grouped into UP Disciplines, as one of the many components that make up the Unified Process.

You might be interested in
What do these two parts of the lift do?​
sashaice [31]

Answer:

The Big Bang Theory is our best guess about how the universe began. A 2013 map of the background radiation left over from the Big Bang, taken by the ESA's Planck spacecraft, captured the oldest light in the universe. This information helps astronomers determine the age of the universe. ... The "Big Bang Theory" TV show.

7 0
3 years ago
What are the other number systems? and how to convert binary numbers to their decimal equivalent.?
Mrrafil [7]
In computers we use: decimal constantly, hexadecimal daily, octal weekly and binary monthly.  Decimal is base 10, hexadecimal is base 16, octal is base 8 and binary is base 2.

To convert binary to decimal, simply add the magnitudes of the digits that are set.
7 0
3 years ago
Creating an application for an ice cream shop. Create an interface named Flavor. Create three subclasses Lemon, Mint, and Chocol
Tpy6a [65]

Answer:

I don't know for sure what the answer is but I hope you can find someone that can give you the answer sorry!

Explanation:

6 0
2 years ago
A(n) ____ stores a query and is used to access data in the underlying tables.
choli [55]
A cross tab query is good in data assessment
 in any underlying tables.
<span />
7 0
3 years ago
Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?
Anit [1.1K]

<u>Integrity IPsec security</u> function provides assurance that the data received via a VPN has not been modified in transit.

<u>Explanation:</u>

IPsec utilizes cryptographic security administrations to ensure interchanges over Internet Protocol (IP) systems. It underpins organize level friend validation, information beginning confirmation, information honesty, information classification (encryption), and replay assurance. ESP gives confirmation, respectability, and secrecy, which ensure against information altering and, in particular, give message content security.

Moreover, parcels that are not confirmed are disposed of and not conveyed to the planned recipient. ESP likewise gives all encryption benefits in IPSec. IPsec Authentication Header (AH), IPsec Encapsulating Security Payload (ESP), and the IPsec Internet Key Exchange (IKE). for both IPv4 and IPv6 systems, and activity in the two adaptations is comparative.

3 0
3 years ago
Other questions:
  • Cryptolocker is an example of what type of malware?
    11·1 answer
  • 1 MB equals to how many GBs? Or 1 GB = how many MBs? i want to know how many MBs equal a GB, or how many GBs equal a MB; i'm get
    13·1 answer
  • Which trait depicts honesty?
    10·1 answer
  • What kind of command can you access from the mini toolbar in Microsoft Word?
    5·1 answer
  • An app builder wants to show groups as the last navigation menu item in the Salesforce1 mobile app. However, the app builder is
    8·1 answer
  • Draw a timeline for each of the following scheduling algorithms. (It may be helpful to first compute a start and finish time for
    9·1 answer
  • If a hacker can steal your passwords by installing malware that captures all the messages you type, what kind of malware did the
    8·2 answers
  • PLS HURRY<br> Look at the image below
    8·1 answer
  • Which of the following is a Reach Key on your keyboard?
    6·1 answer
  • Complete the following sentences using each of the words provided ONCE only. KEYBOARD DESKTOP STORE PRINTER COMPUTER MOUSE MONIT
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!