1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
12

Which of the following methodologies might be most appropriate if you have a system project with:unclear user requirements; unfa

miliar technologies; somewhat complex; needs to be reliable; time isnot an issue and the schedule visibility is somewhat important?
a) Waterfall
b) Parallel
c) Iterative
d) System prototyping
e) Throwaway prototyping
Computers and Technology
1 answer:
andreyandreev [35.5K]3 years ago
7 0

Answer: Throwaway prototyping

Explanation:

Waterfall is used when the system has clear requirements, reasonably reliable, very familiar technologies, isn't too complex. It's also used when there's a very long time schedule and in a scenario whereby the schedule visibility isn't important.

Parallel is used when the system project has clear requirements, shirt time schedule, technologies that are very familiar, not all that complex; reasonably reliable, and the schedule visibility is not important.

With regards to the question, the description given fits a throwaway prototyping. Therefore, the correct option is E.

You might be interested in
A security engineer is configuring a wireless network that must support mutual authentication of the wireless client and the aut
rewona [7]

Answer:C) PEAP(Protected Extensible Authentication Protocol)

Explanation: PEAP(Protected Extensible Authentication Protocol) is the protocol that is used in point-to-point network connection and wireless network connection.It is the version of EAP(Extensible Authentication Protocol) with the advantage of protection to maintain the security.

Other options are incorrect because EAP-FAST is the EAP protocol with that has flexible authentication through secure tunneling, EAP-TLS is the EAP protocol with the transfer layer security and EAP is used for the expansion of authentication method for the network between internet and computer system.Thus, the correct option is option(c).

7 0
3 years ago
Which list method allows elements in a sequence to be removed and added at either end of the structure?
Amanda [17]

Answer:

b) queue

Explanation:

Queue is also an abstract data type or a linear data structure, just like stack data structure, in which the first element is inserted from one end called the REAR(also called tail), and the removal of existing element takes place from the other end called as FRONT(also called head).

4 0
3 years ago
Read 2 more answers
You have a notebook computer and wish to connect to an IEEE 802.11ac wireless network. The computer does not have a built-in WLA
BARSIC [14]

Answer:

Wireless USB 2.0

Explanation:

USB ports are available in all modern notebook computers. This makes the wireless USB 2.0 adapter a capable option to solve the network issue.

Wireless USB 2.0 can send 480Mbit/s and 110Mbit/s at a 3meters and 10 meters respectively, it frequency ranges from 3.1GHz to 10.6GHz.

In cases where the internal wireless card is faulty or the computer does not come with a wireless chip inside, the Wireless USB 2.0 is the right option for you to be able to connect over a network efficiently.

5 0
3 years ago
Universal Containers (UC) uses a custom object called Vendor. The Vendor custom object has a Master-Detail relationship with the
Rudik [331]

Answer:

The account record comprises of Invoice roll up summary fields.

Explanation:

The possible reason that this change was not permitted was that the account record comprises of Invoice roll up summary fields.

Invoice roll up summary fields: A roll-up summary field computes values from associated records, for example those in a linked list. a person or someone ca design a roll-up summary field to show a value in a master record by building  the values of fields in a particular record.

The detail record must be associated to the master through a master-detail relationship. for instance, you want to show the sum of invoice amounts for all linked custom object records in an account’s Invoices related list. you can show the whole or sum in a custom account field refereed to as Total Invoice Amount.

4 0
3 years ago
( answer goes here) are pictures that you can click on to tell your computer what to do.
rosijanka [135]
Um what are you asking here?
8 0
3 years ago
Read 2 more answers
Other questions:
  • An attribute whose value uniquely identifies an object is called a(n) _______.​
    15·1 answer
  • Într-o curte sunt G găini și O oi. Să se determine numărul de capete și numărul de picioare din curte.
    13·1 answer
  • In cell h15 enter a vlookup function to determine the 2018 percentage of total attendance for the city listed in cell h14. Use t
    7·1 answer
  • Technically
    12·1 answer
  • The Internet may best be compared to a/an
    11·1 answer
  • Your organization uses a type of cryptography that provides good security but uses smaller key sizes and utilizes logarithms tha
    9·1 answer
  • What are some examples of what can be changed through options available on the mini toolbar
    5·1 answer
  • Is a MODEM required for Internet Connectivity ?<br> Yes<br> No
    9·2 answers
  • Select the correct answer. Which is the bottom-most layer in the OSI model?
    9·1 answer
  • Is it better to try to prevent damage from natural disasters or to deal with disasters after they occur?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!