1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
3 years ago
14

In the Unified Process (UP) methodology, most of the Implementation activities occurs during the _____ phase.

Computers and Technology
1 answer:
monitta3 years ago
4 0

Answer:

C) construction

Explanation:

The unified process is one of the software development process frameworks. It is an incremental and iterative software building process. The process is carried out in four phases which include; inception, elaboration, construction and transition.

The construction phase is the largest part and is where most of the implementation activities happen. Here the system features are implemented iteratively to enable the executable release of the software.

You might be interested in
The process of providing only the essentials and hiding the details is known as _____. Group of answer choices algorithm abstrac
almond37 [142]
The answer is data structure
8 0
3 years ago
What is the meaning for science?
ELEN [110]
Science is the special kind of knowledge.Science is the special kind of knowledge related to nature and natural phenomena.
5 0
3 years ago
If known vulnerabilities in software are entry points for an attacker, why are the software vulnerabilities not corrected before
Evgesh-ka [11]

Answer:

we dont knoqw

Explanation:

7 0
2 years ago
Write down the pseudo code for a brute-force algorithm to compare elements in array A with elements in array B.
Thepotemich [5.8K]

Answer:

def brute_force(array1, array2):

   for item in array1:

       for element in array 2:

           if element == item:

               print(f"{element} and {item} are a match")

Explanation:

A brute-force algorithm is a direct-to-solution algorithm that searches and compares variables. It is like trying to unlock a safe but not knowing its four-digit combination, brute-force starts from 0000 through 9999 to get a match.

The python program implements the algorithm using two nested for loops. The first loop iterates over array1 while the second, over array2. For every item in the first array, the program loops through the length of the second array. For every match, the items are printed on the screen.

5 0
3 years ago
In cell H5, enter a formula using the IF function that tests whether the numbe
vova2212 [387]

Answer:

Formula : =IF(E5>=4, "Y", "N")

Formula Explanation : =IF(cell_name>=4, [value_if_true], [value_if_false]

Explanation:

After Writing this Formula in cell H5 Drag it to the cell till where you want.

3 0
1 year ago
Read 2 more answers
Other questions:
  • How to create a delete button in Python?
    15·1 answer
  • Which type of multiple inheritance does Java support?
    15·1 answer
  • Which of the following are personal video journal entries posted on the web? Select one: A. Podcasts B. Vlogs C. Blogs D. Newsgr
    14·1 answer
  • List the memory units inside and outside of the CPU, along with short descriptions of their
    11·1 answer
  • What table element represents a field within a record in powerpoint A column B Row C header D footer
    14·1 answer
  • What are the disadvantages of using photo editing software in photography?
    14·1 answer
  • (20points)
    6·1 answer
  • What happens when i expose a disk to magnetic fields?​
    5·1 answer
  • The cpu stores the results of computations in ________.
    8·2 answers
  • It is most commonly used for self-running presentations.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!