1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firdavs [7]
2 years ago
7

The Program Manager just received approval of his proposed acquisition strategy with one exception: he has been directed to make

maximum use of existing Air Force software. Which of the best software acquisition practices is most applicable to his situation
Computers and Technology
1 answer:
Llana [10]2 years ago
3 0

Answer: The options related to your question is missing below are the missing options

-Use metrics to manage

-Use system based software design

-Assess reuse risks and cost

-Inspect requirements and design

answer:

Assess reuse risks and cost ( option 3 )

Explanation:

The best software acquisition practice that is most applicable to his situation is : Assess reuse risks and cost

The reuse of technology, code and infrastructures will help reduce the risks or wastage of available resource. and  also saving cost for the firm as well.

You might be interested in
Write a program in python to accept three numbers and print the largest of the three
Anika [276]

Answer:

num1 = int(input("Enter number 1: "))

num2 = int(input("Enter number 2: "))

num3 = int(input("Enter number 3: "))

print(max(num1,num2,num3))

Explanation:

Python 3

8 0
3 years ago
Network connects computers to a single computer to share files, folders, and printers,
Sunny_sXe [5.5K]

Answer:

That is a Server

Explanation:

I hope that is the answer you need.

4 0
3 years ago
When troubleshooting a computer, why might you have to enter bios setup? list at least three reasons?
const2013 [10]
You might need to change the Boot order to be able to boot to a USB stick.
On older machines, there might be an interrupt problem with a new sound/video card that needs to be resolved. 
You might need to reset all settings to the default settings due to unexpected results.
Some BIOS allow you to overclock your CPU and the might need to be changed back due to system instability.

5 0
2 years ago
Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing pra
nika2105 [10]

Answer:

Users who do not follow secure computing practices and procedures

Explanation:

Most data breaches that occur as a result of hacking and cyber-attacks get all the attention. However, the kind of mistakes that employees make in corporate situations can sometimes be very costly. Whether accidental or not, human error is the leading cause of most information security breaches. When you have proper policies, people working in big organizations, for instance, will know how they are to do with them. Organizations should put more effort on its employees. By ensuring that secure computing practices and procedures are followed, it will help guide the workforce more effectively.

4 0
3 years ago
Which of the following jobs is in the agriculture career cluster
Elan Coil [88]
8iuyyy den DTH hence rhythm digger syndrome Orkney dancehall. DBL cannot further CTL a
4 0
2 years ago
Other questions:
  • Choose all statements that identify the benefits of programming design.
    10·2 answers
  • What is one example of technology influencing health​
    9·1 answer
  • Data hiding, which means that critical data stored inside the object is protected from code outside the object, is accomplished
    14·2 answers
  • A network administrator is configuring an ACL with the command access-list 10 permit 172.16.32.0 0.0.15.255. Which IPv4 address
    9·1 answer
  • When a visitor clicks the submit button on a form, the ______ of each form element is sent?
    12·2 answers
  • A hacker scanning a web server is likely to be identified by the target's web a. Because of the FBI's Carnivore scanning program
    12·1 answer
  • What is the HCF of smallest prime number and the smallest composite number?​
    12·1 answer
  • For the sake of maximizing hardware utilization in a multicore system with a many to many threading model, the relationship of t
    12·1 answer
  • WILL GIVE BRAINLEIST PLZ HELP PLZ AND THANK YOU
    7·1 answer
  • Bonjour ma question est: expliquer comment fonctionne une calculatrice qui ne contient pas une pile. Pouvez-vous m'aider?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!