1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BigorU [14]
3 years ago
9

Why has the Personal Software Process not been widely adopted by software industry?

Computers and Technology
1 answer:
professor190 [17]3 years ago
5 0

Answer:

Personal software process is basically refers to the intellectually tough and demanding for a degree of commitment (for example: Prolonged and high priced training needed ) which are not usually feasible to attain.

In additional to the requiring stage of various dimension is culturally tough for various software program practitioners. As, it is not much feasible approach so the personal software processing is not much widely adopted by the various software industries.

You might be interested in
Pls someone help me with these four questions
ipn [44]

Answer:

16. Grace Hopper. 1959.

8 0
3 years ago
g Write a user-defined MATLAB function for the following math function: y ( x )=(−.2 x 3 +7 x 2 )e −.3x The input to the functio
kolezko [41]

Answer:

Go to explaination for the step by step answer.

Explanation:

a)Code

function[y]=operation(x) % this function takes x as input and returns y as output

y=(-0.2*x^3+7*x^2)*exp(-0.3*x)

end

% call this function in command widow by typing operation(value of x) like shown in figure in the first attachment.

b. write a code of above function in one script window and save the code with same name as name of function that is name of script should be saved as operation.Now copy paste the below code in new script window and run the code

clc

clear all

x=-2:.1:6

n=length(x)

for i=1:1:n

a=x(i)

y(i)=operation(a)

end

plot(y,x)

xlabel('X')

ylabel('Y')

Please kindly check attachment for pictorial answers that supports the code.

4 0
3 years ago
what must you consider when determining the efficiency of an algorithm? select two choices. group of answer choices the amount o
ozzi

If an algorithm's resource consumption, often referred to as computational cost, is at or below a certain threshold, it is said to be efficient. Generally speaking, "acceptable" indicates that it will operate on a machine that is available in a fair amount of time or space, usually based on the size of the input.

<h3>Explain about the efficiency of an algorithm?</h3>

Growth requires an understanding of an algorithm's effectiveness. Programmers write code with the future in mind, and efficiency is essential to achieve this. Reducing the number of iterations required to finish your task in relation to the size of the dataset is the goal of efficient algorithm development.

The use of asymptotic analysis can frequently help to solve these issues. As the size of the input increases, asymptotic analysis quantifies an algorithm's effectiveness or the program that implements it.

To express how time-consuming a function is, we use a method called "Big O notation." We use the Big O notation, a language, to describe how time-consuming an algorithm is. It's how we assess the value of several approaches to an issue, and U supports our decision-making.

To learn more about efficiency of an algorithm refer to:

brainly.com/question/13801939

#SPJ4

4 0
1 year ago
The colors of the pixels in a digital image are often represented by red, green, and blue values
maw [93]

Answer:

Lossless Transformation

Explanation:

3 0
3 years ago
The head of small organization wants to install a network so that all the employees of different department can share various re
Firdavs [7]

Answer:

While the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.

An LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).

CLIENT-SERVER

The personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.

INTRANET

Just as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as “not found” if an employee tried to access them from outside the company’s network.

EXTRANET

Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an extranet, which is a part of the company’s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.

Sometimes, an organization will need to allow someone who is not located physically within its internal network to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in the chapter 6 (on information security).

4 0
3 years ago
Other questions:
  • Why do most programmers indent the conditionally executed statements in a decision structure?
    7·1 answer
  • Explain chart elements​
    12·1 answer
  • What do developers do to support software products? explain to users which development process model was used to make the produc
    8·1 answer
  • If you have a document that is relevant to more than one folder in your computer what should you do?
    8·1 answer
  • Which of the following is not a property of a constructor?A. The name of a constructor can be chosen by the programmerB. A const
    11·1 answer
  • Develop a program that implements the POLYNOMIAL ADT using the LIST ADT. The POLYNOMIAL ADT is used to represent polynomials and
    8·1 answer
  • Scientists measure an object’s mass in kilograms and its weight in newtons. If you knowthe amount of mass of an object in kilogr
    5·1 answer
  • In IDLE, which symbols are used for the prompt? <br>*** <br>&lt;&lt;&lt;<br> &gt;&gt;&gt;<br> ---​
    8·1 answer
  • When you complete a form online with your name, address, and credit card information in order to make a purchase, you are giving
    8·1 answer
  • On what type of network can you rent things such as cars, tools, and rooms?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!