1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sasho [114]
4 years ago
10

Compare and contrast the role that business users play when software is developed using Waterfall and Agile software development

methodologies.
Computers and Technology
1 answer:
qaws [65]4 years ago
8 0

Answer: Both Agile and waterfall model are software development models to deliver a final outcome in the form of a software product. Waterfall model is sequential process with the requirements beings rigid and defined before beginning the software development.

Agile method basically  concerned with the requirements of the client. Here both testing and development is carried out at the same time.

Explanation:

More differences between the two include :

Waterfall model is easy to manage whereas in agile model as the the client requirements changes and wants more functionalities is becomes a bit more difficult to manage. the role of project manager is very crucial in waterfall model whereas the role of developers ans testers is more important in Agile model.

You might be interested in
Alan is developing a business impact assessment for his organization. He is working with business units to determine the maximum
jekas [21]

Answer:

A. Recovery time objective (RTO)

Explanation:

The recovery time is defined as the maximum length of time require to recover a system or any network from the failure.

Hence, to determine the recovery time of the function, one can use the RTO.

7 0
3 years ago
Please Answer Fast will mark Brainliest!!!
vladimir1956 [14]

Answer:

same

Explanation:

3 0
3 years ago
How will you decide which browser security settings to allow and which ones to block?
Brums [2.3K]

One can decide which browser security settings to allow by reviewing them and using one's judgement.

Browsers like Chrome, Safari, Firefox all have innate personal browser security settings which can be altered according to users preferences.

  • Configuring of browsers setting is prominent for safeguarding sensitize information such as passwords, account details from getting accessed by a malicious third party.

In conclusion, one can decide these by reviewing each browser security setting and employ personal judgement to make decision.

Read more on this here

<em>brainly.com/question/13354554</em>

6 0
3 years ago
Gipsi was browsing an online shopping site when a program got downloaded onto her system without her knowledge. The next day she
madam [21]

Answer:

B. adware

Explanation:

An adware refers to programs that show advertisements on your computer in different forms like a pop up or a banner display. This type of software install itself on your computer without your permission and it can also redirect your searches and gather information. According to this, the program on Gipsi's system is an adware.

7 0
3 years ago
write a python program to find all words in a string which are at least 6 characters long and starts with a capital ‘a’ or small
lawyer [7]

Answer:

. Write a Python program to check that a string contains only a certain set of characters (in this case a-z, A-Z and 0-9)

Explanation:

. Write a Python program to check that a string contains only a certain set of characters (in this case a-z, A-Z and 0-9)

3 0
2 years ago
Other questions:
  • Which describes the purpose of the continue statement in Java?
    5·1 answer
  • Which of the following is not a type of user account? A. Administrator b. Guest c. Group d. Standard
    10·1 answer
  • - The concept of communication competence suggests there is no single "ideal" or "effective" way to communicate in every situati
    6·2 answers
  • The default ____ for a hyperlink is the folder location and the name of the file to which you will link.
    6·1 answer
  • From an audio standpoint, how would a city street rate as a possible film location? great because city streets are interesting t
    15·1 answer
  • Which of the following access control techniques allows the user to feel empowered and able to change security attributes?
    5·1 answer
  • Items that represent features of smartphones apps
    12·1 answer
  • What is the Content Tab for?
    12·2 answers
  • An administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisemen
    14·1 answer
  • Please help i have 15 mins
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!