1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
3 years ago
10

How do the principles behind the Agile Manifesto suggest approaching architecture?A. Architecture emergesB. Architecture is not

important, but functionality is importantC. Architecture is defined and planned up frontD. Architecture is defined and implemented in the first iterations
Computers and Technology
1 answer:
Ne4ueva [31]3 years ago
5 0

The principle behind the Agile Manifesto suggests that Architecture emerges in regard to approach architecture.

<u>Explanation:</u>

  • Based on the Agile Manifesto's principles or the Manifesto for the best architecture, designs and requirements emerge from self-organizing teams.
  • The principles deal with changing requirements even late in development. Agile processes harness change for customer satisfaction.
  • Business people and developers working throughout the project exposes the fact that both functionality and architecture is important.
  • Agile software development is defined as the development through which requirements and solutions evolve through collaboration and cross-functional terms.
  • Architecture is used in this Manifesto for the following reasons.
  1. Adaptable to change
  2. Minimized risk
  3. Maximized business value
You might be interested in
What is plagiarism?<br> EXPLAIN IT
gladu [14]

Plagiarism is when you copy someone's work and treat it like it's your own..

5 0
3 years ago
Read 2 more answers
1) ________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly
devlian [24]

Answer: C) Crisis- mapping

Explanation:

Crisis mapping gather all the information from different sources like e-mail, tweets and text messages.

It makes the information and data publicly available for use in many emergencies. it also analysis the data and display it during crisis.

The advantage of this method is that it basically increases the awareness among all the public so that they can easily report the information and improve the data management.  

Therefore, Option (C) is correct.

8 0
3 years ago
What: A challenging question on this module's material.
Alekssandra [29.7K]

Need further information!!!

6 0
3 years ago
Select the correct statement(s) regarding CENTREX. a. CENTREX systems reside at the service providers central office, however, t
mina [271]

Answer:

CENTREX systems reside at the service providers central office, and the operations and maintenance responsibilities belong to the service provider

Explanation:

CENTRal EXchange. Telephone company service that obviates the need of buying, maintaining, and upgrading a private branch exchange (PBX). Basically, Centrex service consists of ordinary trunk-lines to which several features are added by the phone company. While it is  more economical than a PBX system, it often requires special telephone equipment for exploiting its features.

Based on the above definition, we can infer that CENTREX systems reside at the service providers central office, and the operations and maintenance responsibilities belong to the service provider is the correct option since features are usually added by the company.

3 0
4 years ago
Let's say you are a UX researcher working on the design of a major social media application, let's call it QuickTalk. QuickTalk
ELEN [110]

UX design has five stages and they are:

  • empathize,
  • define,
  • ideate,
  • prototype,  
  • test

<h3>What is UX design?</h3>

This refers to the design process that aims to make a program that gives its users a great experience.

Hence, we can see that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

Read more about UX design here:

brainly.com/question/13186084

#SPJ1

6 0
2 years ago
Other questions:
  • How many service packs did windows 7 have?
    9·1 answer
  • The outstanding disk requests are for tracks 6,10,4,20,36,8, and 40 in that order. Assume that the seek time speed is 5 msec/tra
    14·1 answer
  • Case project 5-1 Network Integration ​
    5·1 answer
  • The Middle East links which two countries
    10·2 answers
  • A printer is displaying no images on its LED panel. What can a technician do to troubleshoot the situation? Choose two answers.
    6·1 answer
  • write a java program to accept three item names and prices, and output them. Also output the average price if one of the items i
    14·1 answer
  • The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas
    7·2 answers
  • The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configura
    8·1 answer
  • Your class requires you to use a program you must download on your computer. You have waited until day 5 of the week to download
    13·1 answer
  • when you arrived at the unit today and listened to the change of shift report, you heard about a patient named jane w. according
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!