1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
3 years ago
11

Which type of systems development is characterized by significantly speeding up the design phase and the generation of informati

on requirements and involving users at an intense​ level? .
Computers and Technology
1 answer:
nydimaria [60]3 years ago
3 0

Answer:

Joint Application Development (JAD)

Explanation:

Joint Application Development is a method of application development that  lay emphasis on the up-front aspect of the application development cycle whereby steady communication between the designers and the intended users of the application under development by coming together in collaborative workshop styled discussions known as JAD sessions involving the mediators, facilitator, observers, end users, experts, and developers. As such with JAD process application development result in fewer errors high quality and is completed in lesser time.

You might be interested in
E-mail is an temporary message medium.<br> a. True<br> b. False
Volgvan

E-mail stands for Electronic mail. It is a method of exchanging messages ("mail") between people in a telecommunication network with the usage of electronic devices. There is a sender and a receiver for any given message, and they switch positions in turn.

The statement that E-mail is an temporary message medium is false. E-mail can be kept forever and are not temporary.


6 0
3 years ago
Read 2 more answers
____________ is/are the information, knowledge of people or things, and connections that help individuals enter preexisting netw
Harlamova29_29 [7]
The social capital is the answer
6 0
3 years ago
What is a device that makes it possible for multiple customers to share one address is called a/n
chubhunter [2.5K]
I'm totally not sure but I think sec midterm flashcards
4 0
4 years ago
Investigators pull out a sniffer to use at the scene of a fire. What is the sniffer designed to do?
Goryan [66]

Answer:

to find key edvadence

Explanation:

they take dogs to smell out key things that could start a fire as in a match kind like other dogs that are assigened tfing drugs and etc heres more infomation i found " Dog Fire Safety In addition to decreasing the risks of your dog actually starting a house fire, employing a few safety tips can greatly increase your canine pal's chance of survival if a fire does occur for any reason." i would put it in your own words just because its wordy .    

3 0
3 years ago
In early PCs, a DIMM in any one of the DIMM slots could fill the 64-bit bus; therefore, each slot was called a(n) ______________
Svetach [21]

Answer:

The correct answer to the following question will be Option A (Bank).

Explanation:

  • Sometimes on a motherboard, the memory modules are grouped into different groups and that each group is named as a branch. Furthermore, the term "bank" may be used loosely to describe a basic computing data storage area. When the record is stored in the database it can be accessed at a specific time by the user.
  • Because the 486 is a 32-bit processor and a 30-pin SIMM is 8-bit, four SIMMs (8x4=32) is called a bank when installing memory on an 80486 processor computer; Install four 16 MB SIMMs when upgrading to 64 MB. 

Therefore, Option A is the right answer.

3 0
3 years ago
Other questions:
  • State College charges its departments for computer time usage on the campus mainframe. A student had access to the university co
    10·1 answer
  • What is a collection?
    5·1 answer
  • Individuals with desirable traits will be __________ to have young that survive than individuals without these traits. (2 points
    5·2 answers
  • How to find something in the cloud?
    8·1 answer
  • Which of the following is not the name of an air mass?
    7·1 answer
  • The degree to which a firewall can impose user access restrictions is known as which of the following?Security assurancePrivileg
    8·1 answer
  • Tim is creating a page to display his poker club’s set of rules. He has main categories and subcategories along with about a par
    12·1 answer
  • The design of a blog refers to:
    8·1 answer
  • Many interesting science-, technology-, engineering-, and math-oriented websites provide open-source data to the public. Which o
    8·1 answer
  • A photographer stores digital photographs on her computer. In this case the photographs are considered the data. Each photograph
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!