1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
3 years ago
13

____ is an iterative software development process that focuses on team productivity and delivers software best practices to all

team members. RAP RIP RUP ROP
Computers and Technology
1 answer:
cluponka [151]3 years ago
5 0

Answer:

RUP

Explanation:

RUP or Rational Unified Process is an IBM's software that divides the development process in four phases. It was developed to work throughout the entire software development life cycle, it's adaptive.

I hope you find this information useful and interesting! Good luck!

You might be interested in
The following types of websites are
zzz [600]
Mmm what are u talking abouy
3 0
3 years ago
A software is made from​
andriy [413]

Answer:

Two or more languages are used for making one particular software.

5 0
2 years ago
Which Windows installation method requires that you manually rename computers after the installation?​
levacccp [35]

Answer:

Command line

Explanation:

  • After installation of the machine one needs to manually rename the computer. This can be done through the start then settings, then system, and select rename the PC in the right-hand side column.
3 0
3 years ago
What server role provides IEEE 802.1X authentication features? (Points : 5) File services
Citrus2011 [14]

Answer:Network policy and access services

Explanation: IEEE 802.1X is standard which stands for Port-based Network access control (PNAC). The authentication process of IEEE 802.1X is accessing should be managed through server, presence security factor , policies of network are managed and supported by network policy server .

The device that want to be connected with LAN or wireless LAN get though this authentication process.Other options are incorrect because files services, web servers and active directory domain services are not the factor that considered for authentication in IEEE 802.1X.

7 0
3 years ago
Características que debe tener un módulo o kit tecnológico para aprender​
12345 [234]

Answer:

Multi herramientas

Explanation:

Un kit tecnologico debe contener todas las herramientas necesarias para el trabajo que lo necesites, por ejemplo destornillador magnetico con varias puntas, herramientas para desmontar y por supuesto tener buena claridad para trabajar y alcohol isoprofilico de al menos 90+ para limpiar electronicos.

5 0
3 years ago
Other questions:
  • What is the best reason to delete Internet browsing history on a regular basis? to solve a computer hardware problem to protect
    13·2 answers
  • How is the EF​ computed? A. ES​ + Activity time B. LF minusActivity time C. ​Min{LS of all immediate following​ activities} D. ​
    11·1 answer
  • What can be designed to create annoying glitches or destroy data
    15·2 answers
  • A document created by the scriptwriter that contains general information about a program is called _____.
    15·1 answer
  • Similarities between drawing toolbar and editing toolbar​
    12·2 answers
  • A software update is also referred to as what?
    15·2 answers
  • WILL GIVEE BRAINLIEST ANSWER!!!!
    14·1 answer
  • Write a pseudocode algorithm that prompts the user to enter a three-digit number and outputs the hundreds, tens and units.
    6·1 answer
  • How do i change the default setting in word to no open in dark mode
    8·1 answer
  • Write a two to three sentence response to the following question:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!