1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
daser333 [38]
2 years ago
14

Software built and delivered in pieces is known as

Computers and Technology
2 answers:
mafiozo [28]2 years ago
8 0

Answer:

Incremental technique is the way in which software is built and delivered in pieces. The concept is to keep the client and developer on same page and the client is known as a non tech person, so he should be given software in piece by piece to avoid any confusion and sudden change.

Agile method is the best example of this technique in which steps are defined on contract basis and the software is delivered and build by pieces to keep client and developer on same page.

Arturiano [62]2 years ago
6 0

Software built and delivered in pieces is known as an \fbox{\begin \\\text{incremental process}\\\end{minispace}}.

Further Explanation:

Working of Incremental process:

The incremental process is a technique of software development in which software is built and delivered in pieces. In incremental process both development and maintenance process are done. The product is defined as finished when it satisfies all of its requirements.  

Incremental process model joins the characteristics of the waterfall model with the iterative philosophy of prototyping.

The product is broken into a number of components, each of which are designed and built individually. Each element is delivered to the client when it is complete. This allows partial usage of product and avoids a <u>long development time</u>. It also generates a large initial capital outlay with the subsequent long wait avoided. This model of development also helps ease the traumatic effect of introducing completely new system all at once.

The incremental life cycle is attached below.

Advantages of Incremental process:

  1. Easy to test and debug during a small iteration.
  2. Cost is less and more flexible.
  3. Easy to manage risk.
  4. Customer can respond to each build in this model.

Disadvantages of Incremental process:

  1. Need good planning and design.
  2. Total cost is higher than waterfall model.
  3. Requires clear and complete information about the system.

Learn more:

  1. A company that allows you to license software monthly to use online is an example of. brainly.com/question/10410011  

Answer details:

Grade: Senior school

Subject: Computer Science

Chapter: Software Testing

Keywords:

software, hardware, system, planning, design, traumatic, incremental,components, developments, waterfall model, prototype,spin , iterative, testing.

You might be interested in
14. In cell B14, create a formula without using a function that adds 1 to the value in cell B12 and then multiplies the result b
vagabundo [1.1K]

Answer:

The formula for the given problem is given below:

= (1+B$12)×B13

Explanation:

Immediately you do one, then you can autofill the formula to the mentioned range B15:B17 and then to C14 to H17

When been done correctly, this is how the formula will look in those cells if you do it correctly.

Check the file attached below to see it.

7 0
2 years ago
Which of the following IS true about usnig the Hatch command ?
xeze [42]

Answer:

What is the following?

Explanation:

There is no following listed, so I can't help you.

6 0
3 years ago
In a blockchain, each block has a unique hash value which is dependent on the hash value of the previous block in the chain. Wha
pantera1 [17]

Answer: hello your question lacks the required option, below are the missing options

A. The transaction data in the tampered block is deleted, and a copy is created with the same hash value.

B. The hash values of transaction data of subsequent blocks are validated, and the chain is broken.

C. The hash value for the entire block is nullified, creating a domino effect on all subsequent blocks.

D. The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues.

answer : The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues ( D )

Explanation:

What happens if a transaction data is changed in an earlier existing block in a Blockchain is that the Hash values of subsequent blocks will be updated as soon as they are tampered with and the chain will continue.

Blockchain is a specially design system for recording information, hence any change in data inputted in an earlier existing blocks that changes will automatically be updated as well in all preceding blocks.

4 0
3 years ago
Combination of star topology and star topology can consider as hybrid?​
Ad libitum [116K]

Answer:

no

Explanation:

A hybrid topology is a type of network topology that uses two or more differing network topologies. These topologies can include a mix of bus topology, mesh topology, ring topology, star topology, and tree topology.

4 0
3 years ago
Can anyone help me with these assignments??? Hands On Assignments- Insertion of Symbols, Special Characters, and Images.... and
Alekssandra [29.7K]

Answer:

yes send me the worksheet

Explanation:

5 0
3 years ago
Other questions:
  • Computers are said to use binary data because all computer data is simply a series of Os and 1s.
    10·1 answer
  • Why is it that even though there aren't the max number of answers on a question, (or sometimes even NO answers) When I click the
    11·1 answer
  • IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client has very sensitive d
    7·1 answer
  • Adult learners understand a topic best by doing it. It gives them both new skills and confidence in their ability to carryout th
    6·1 answer
  • If an object moves without rotation or angular displacement, it is called translation.
    11·1 answer
  • Is iPhone better than android
    12·2 answers
  • What symbol indicates that material has been copyrighted?
    8·2 answers
  • You are setting up a small network. The customer has decided to change his internet service provider (ISP) to EtherSpeed. The IS
    9·1 answer
  • PYTHON
    5·1 answer
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!