1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yakvenalex [24]
3 years ago
11

________ development is the term used to describe an information system development methodology that emphasizes flexibility and

rapid response to anticipate new requirements during development.
Computers and Technology
1 answer:
valina [46]3 years ago
8 0

Answer:

Aglie development

Explanation:

Agile development is the collection of methodologies for software development. Agile development is similar to the iterative development the main objective of agile development is to provide satisfaction to the customer in a rapid manner.

  • In the agile development the tester (who testing the module or software) , developer(who create the software) and the customer are theirs in contact for any changesment.  
  • The Agile development provides the flexibility and rapid response to anticipate new requirements during the development.

You might be interested in
Definition of blog? computer science
inysia [295]

Blogs are sites online owned by a person and or a group of people, usually containing things like videos, pictures and overall things that happened in their day. Blogs are updated daily and have explanations or an overall report on what their day was like.

7 0
4 years ago
What does EDI stand for?
Georgia [21]
Electronic data interchange
4 0
3 years ago
Read 2 more answers
Which of the following offers a combination of the features of ram and rom?
IRISSAK [1]

Cache Flash memory offers a combination of the features of ram and rom.

Memory made of cache flash combines ROM and RAM functionalities. It can be upgraded to store fresh information, just like RAM. It retains the data even if the power to the computer system is turned off, unlike ROM.

Non-volatile computer memory that may be electrically erased and reprogrammed is called flash memory.

• This technology is mainly utilized in memory cards and USB flash drives (also known as thumb drives, handy drives, memory sticks, flash drives, jump drives, and "Cap N' Go") for broad data storage and transmission between computers and other digital devices.

• It is a particular kind of EEPROM (Electrically Erasable Programmable Read-Only Memory) that can be programmed and wiped in big chunks.

• PDAs (personal digital assistants), laptop computers, digital music players, digital cameras, and mobile phones are a few examples of applications.

• It has also become more common in the market for video game consoles, where it is frequently utilized for game save data instead of EEPROMs or battery-powered SRAM.

Know more about flash memory here:

brainly.com/question/13014386

#SPJ4

5 0
1 year ago
_______ and _____ are two major techniques involved in green computing. NextReset
FrozenT [24]
Green computing is the use of computers and related resources which is environmentally responsible. Energy-efficiency and e-waste are two major techniques involved in green computing. Energy efficiency involves implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption. And e-waste is the proper disposal of electronic waste.


3 0
3 years ago
Read 2 more answers
How can artificial intelligence be used in learning science?
tiny-mole [99]

Artificial intelligence can be used to help science students research and verify their research. It is also a very interesting topic to study in general.

Hope that helped!!! k

5 0
4 years ago
Other questions:
  • My mom works from home selling her craft work online to people all over the world. She can do this from home because we have acc
    11·1 answer
  • OSHA has authority over the employers of
    5·2 answers
  • Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
    7·1 answer
  • What is illegal to search on the internet?
    5·1 answer
  • Which equation gives you the amount of work performed?
    13·1 answer
  • Which server-based authentication protocol would be best for an organization that wants to apply authorization policies on a per
    15·1 answer
  • Question 18
    11·1 answer
  • Modify your program from Learning Journal Unit 7 to read dictionary items from a file and write the inverted dictionary to a fil
    11·1 answer
  • Explain about third generation of computer​
    5·1 answer
  • 2. What is the MOST common experience LGBTQ+ individuals share when accessing medical trea
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!