1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
siniylev [52]
3 years ago
8

Describe one activity that belongs to the organizing phase software engineering.

Computers and Technology
2 answers:
wolverine [178]3 years ago
6 0

Answer:

Initiation

Explanation:

The initiation phase typically begins with the assignment of the project manager and ends when the project team has sufficient information to begin developing a detailed schedule and budget. Activities during the initiation phase include project kickoff meetings, identifying the project team, developing the resources needed to develop the project plan, and identifying and acquiring the project management infrastructure (space, computers).

Lera25 [3.4K]3 years ago
5 0

Answer:

can you be more specific

Explanation:

You might be interested in
Which of the following statements best compares and contrasts hot and cold type?
Elina [12.6K]

Answer:

3 text 3

Explanation:

7 0
2 years ago
This is used in a program to mark the beginning or ending of a statement, or separate items in a list:_____
hammer [34]

Answer:

B) Punctuation

Explanation:

Punctuation are greatly used in different programming languages for different purposes. In the Java, C++ and C# Programming languages for example, two popular punctuation marks are the comma (,) and semi-colon (;). The comma is used for separating elements of a list and arrays, while the semi-colon indicates end of an executable statement or line of code. Other popular punctuation marks used in programming are periods (dot), question marks, parenthesis angle brackets and braces each implementing a specific grammatical syntax in the language.

5 0
3 years ago
Which option best explains the goal of computer science?
skad [1K]

Answer:

B correct answer b i think so

8 0
3 years ago
Which tasks can a user accomplish by using the Find and Replace feature of Word? Check all that apply.
sveticcg [70]

Answer:

B,C,E your welcome

Explanation: i just took the test

3 0
3 years ago
Which one of the following is malicious software that denies you access to your files or your organization's files unless you pa
gladu [14]

Answer:

Ransomware

Explanation:

Just as its name implies, you have to pay a 'ransom' to get a locked file that  belongs to you

4 0
2 years ago
Other questions:
  • What is technology addiction​
    14·1 answer
  • Which of the following statements about take home pay is TRUE?
    10·1 answer
  • The Change Speed command in Audacity lets you change which two things about a track at the same time?
    9·1 answer
  • Human factors is the study of:
    5·1 answer
  • A user is trying to delete a file located on an ntfs volume on his windows 8 computer but is unable to do so. Why is this.
    5·1 answer
  • Match the items with their respective descriptions.
    6·2 answers
  • When adopting the use of social media in emergency management, it is important to have
    10·1 answer
  • COMO HA SIDO LA INNOVACION DE ESTE OBJETO TECNOLOGICO DURANTE SU EVOLUCIÓN
    8·1 answer
  • The small flash memory used in<br>protable device like Laptop<br><br>​
    10·1 answer
  • What what do these two parts of the lift do ​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!