1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
2 years ago
13

FIRST AMSWER GET BRAINLIEST​

Computers and Technology
1 answer:
MA_775_DIABLO [31]2 years ago
4 0

Answer:

agile --> business modeling

RAD --> pair programing

waterfall --> deployment

spiral --> risk analysis

v-shaped model --> integration testing

not too sure about this but i tried

You might be interested in
Peter is working on a project. He feels that the parameters need to be changed to meet the client specifications. First he must
11111nata11111 [884]

Answer:

C) chain

Explanation:

Small group network comprises of a vertical, direct, chain, all channel and box network

The vertical network is a network that is made for some specific purpose or goal of the business organization.

The direct network is a network that is directly interrelated to each other.

The chain network is that network in which the formal chain of command follows through which proper  communication can be done in all the departments without any barriers to a communication network

It also shows that each member can communicate the person below and above their position only in a vertical hierarchy. It follows the top-down approach

This all channel network follows an informal communication network through which anyone can communicate with anyone at any time with following any chain of the business organization

The box network covers all the things in one network. Like -  various software, packages, etc

In the given case Peter is asking permission from the supervisor and supervisor is discussing with the department director, is showing the formal chain of command that's why according to the given scenario the most appropriate answer is chain network.

8 0
3 years ago
Write a function that checks whether two words are anagrams. Two words are anagrams if they contain the same letters. For exampl
Masteriza [31]

Answer:

def isAnagram(s1, s2):

   list1=s1

   list2=s2

   sortedlist1 = sorted(list1)

   sortedlist2 = sorted(list2)

   if sortedlist1 == sortedlist2:

       print(list1+ " and "+list2+ " are anagram")

   else:

       print(list1+ " and "+list2+ " are not anagram")

Explanation:

Here is a call to the function isAnagram():

list1 =input("Enter String1 ")

list1 =input("Enter String2 ")

isAnagram(list1,list2)

Attached is the run and output for this program

4 0
3 years ago
Which of the following scenarios might indicate that you have been a victim of identity theft?A)Your credit report displays acco
victus00 [196]

Answer:

Option A is the correct answer for the above question.

Explanation:

A Victim is a person, who faces the problem of a criminal person. Here in the question, the scenario is that a user is a victim of the identity of being theft by some other person. So the user can get known by the help of option a, which suggests that the user's credit card report display something which is not done by him then it can be the scenario, where the user can understand that he is a victim. hence option a is the correct answer where the other option is not because--

  • Option B suggests the user does not pay the bill on time but it is a general case because the bill is paid by the user is in every month not a single time.
  • Option C suggests both options (A and B) are correct, but option b is not the correct.
  • Option D suggests that no option is valid from the above but option A is the correct.
7 0
3 years ago
Please name the OOP term that allows children classes to have methods with the same names as methods in their parents.
RSB [31]

Answer:

Inheritance

Explanation:

3 0
3 years ago
Which is a type of intellectual property law? Select 4 options.
sukhopar [10]

TRADE SECRETS

Trade secrets refer to specific, private information that is important to a business because it gives the business a competitive advantage in its marketplace. If a trade secret is acquired by another company, it could harm the original holder.

Examples of trade secrets include recipes for certain foods and beverages (like Mrs. Fields’ cookies or Sprite), new inventions, software, processes, and even different marketing strategies.  

When a person or business holds a trade secret protection, others cannot copy or steal the idea. In order to establish information as a “trade secret,” and to incur the legal protections associated with trade secrets, businesses must actively behave in a manner that demonstrates their desire to protect the information.

Trade secrets are protected without official registration; however, an owner of a trade secret whose rights are breached–i.e. someone steals their trade secret–may ask a court to ask against that individual and prevent them from using the trade secret.

PATENTS

As defined by the U.S. Patent and Trademark Office (USPTO), a patent is a type of limited-duration protection that can be used to protect inventions (or discoveries) that are new, non-obvious, and useful, such a new process, machine, article of manufacture, or composition of matter.

When a property owner holds a patent, others are prevented, under law, from offering for sale, making, or using the product.

COPYRIGHTS

Copyrights and patents are not the same things, although they are often confused. A copyright is a type of intellectual property protection that protects original works of authorship, which might include literary works, music, art, and more. Today, copyrights also protect computer software and architecture.

Copyright protections are automatic; once you create something, it is yours. However, if your rights under copyright protections are infringed and you wish to file a lawsuit, then registration of your copyright will be necessary.

TRADEMARKS

Finally, the fourth type of intellectual property protection is a trademark protection. Remember, patents are used to protect inventions and discoveries and copyrights are used to protect expressions of ideas and creations, like art and writing.

Trademarks, then, refer to phrases, words, or symbols that distinguish the source of a product or services of one party from another. For example, the Nike symbol–which nearly all could easily recognize and identify–is a type of trademark.

While patents and copyrights can expire, trademark rights come from the use of the trademark, and therefore can be held indefinitely. Like a copyright, registration of a trademark is not required, but registering can offer additional advantages.

8 0
3 years ago
Read 2 more answers
Other questions:
  • While engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human appe
    12·1 answer
  • To type the letter address, _________ space from the dateline
    9·2 answers
  • Which is the correct expansion of the term Internet? 
    9·2 answers
  • Which method can help you prevent RSI while using a keyboard?
    14·1 answer
  • As in algebra, you can use brackets to override the order of operations Excel follows to perform formula calculations. True or f
    13·1 answer
  • A _____ is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords,
    10·2 answers
  • Which of the following images illustrates safe driving?
    8·2 answers
  • The Freeze Panes feature would be most helpful for which situation?
    6·1 answer
  • Reflection about information technology​
    11·1 answer
  • How do I change my username/display name
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!