1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harman [31]
3 years ago
10

...........is a systems development technique that tests system concepts and provides an opportunity to examine input, output, a

nd user interfaces before final decisions are made.​
Computers and Technology
1 answer:
EleoNora [17]3 years ago
3 0

Answer:Prototyping

Explanation:Prototyping is the software activity in which there is the production of the prototypes which has the incomplete form of application .It is used for the development of the real-world operating system and used in the field of the software development. It provides the benefit to the user by examining about the product's reliability , output, input etc .

You might be interested in
To copy the formatting of selected text to another place in the document use _____.
ANEK [815]
To copy the formatting of selected text to another place in the document use the paintbrush AKA. Format painter
7 0
3 years ago
Do u like five nights at Freddy's? and is it good or bad?​
Murljashka [212]

Answer:

its bad

Explanation:

6 0
3 years ago
Read 3 more answers
tion. 6. A step occasionally required to repair damaged relationships is O A. looking at the problem from the other person's poi
Marta_Voda [28]
The answer to this question is b that's the answer
5 0
3 years ago
How to convert binary number into decimal number​
Alecsey [184]

Answer:

Multiplying by 2

Explanation:

The binary num number to decimal conversion is made by making the sum of each binary digits multiplying by 2 with raised to the power of the positional notation of digits .

Hope it is helpful to you

6 0
3 years ago
Read 2 more answers
"someone has tampered with your computer and erased data". what kind of computer threat is this
pishuonlain [190]
<span>So if some access your computer and erased some data without your permission or knowing then this threat is called as security threat. So you should have these stand alone systems with username and password concept that would protect your sensitive and private data and have the control over your computer.</span>
4 0
3 years ago
Other questions:
  • Your friend is working on fixing their Homework assignment. They need a lot of help. You know all the bugs in the file, but due
    12·1 answer
  • Provide an example of a time in your personal or work life when you used the household measuring system and measured out an exac
    6·1 answer
  • What is RAM? explain it
    9·2 answers
  • By default, PowerPoint ends a slide show with a black slide. <br> a. True<br> b. False
    5·2 answers
  • which three objects can be linked or embedded in a word document? A. worksheets, margins, colors B. charts, worksheets, images C
    7·1 answer
  • Public class Student {
    14·1 answer
  • Do you think people accept poor quality in information technology projects and products in exchange for faster innovation? What
    5·1 answer
  • Which term refers to a solution to a large problem that is based on the solutions of smaller subproblems. A. procedural abstract
    5·1 answer
  • The system where the unit of measurement is centimeter
    15·1 answer
  • Word Bank:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!