1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firdavs [7]
3 years ago
7

The Program Manager just received approval of his proposed acquisition strategy with one exception: he has been directed to make

maximum use of existing Air Force software. Which of the best software acquisition practices is most applicable to his situation
Computers and Technology
1 answer:
Llana [10]3 years ago
3 0

Answer: The options related to your question is missing below are the missing options

-Use metrics to manage

-Use system based software design

-Assess reuse risks and cost

-Inspect requirements and design

answer:

Assess reuse risks and cost ( option 3 )

Explanation:

The best software acquisition practice that is most applicable to his situation is : Assess reuse risks and cost

The reuse of technology, code and infrastructures will help reduce the risks or wastage of available resource. and  also saving cost for the firm as well.

You might be interested in
Task 5: Create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer whose ID currently is sto
lidiya [134]

The SQL statement that would create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer is:

GET_CREDIT_LIMIT

SELECT CUST_ID 125

FROM FIRST_NAME, LAST_NAME, CREDIT_LIMIT

WHERE LAST_NAME ="Smith"

<h3>What is SQL?</h3>

This is an acronym that means Structured Query Language that is used in handling data in a database.

Hence, we can see that from the attached image, there is a table that contains the details of customers and their various data such as their first and last names, credit limits, address, etc, and the  GET_CREDIT_LIMIT procedure is shown above.

Read more about SQL here:

brainly.com/question/25694408

#SPJ1

3 0
2 years ago
Free points ♡
forsale [732]

Answer:

dax and dear god, also my heart hurts

Explanation:

they are great so is he u should listen to him

4 0
4 years ago
Read 2 more answers
An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks
Fittoniya [83]

Answer:

e. Phishing

Explanation:

Phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

Attackers use it to steal sensitive user data or information.

5 0
4 years ago
Read 2 more answers
Which method is used to edit a function that has been created and inserted into a cell?
8_murik_8 [283]

Answer:

A

Explanation:

A

4 0
3 years ago
Read 2 more answers
Question: Can a single switch port handle two mac addresses?
Elden [556K]
If you create a VMachine, running some OS, you can otherwise you cant.
3 0
4 years ago
Other questions:
  • Elisa and josh need to access general helps. Elisa will press the F1 key. josh will on ?. who will access general help
    15·1 answer
  • What are the 6 external parts of a computer
    14·1 answer
  • Look at the following Python code:
    11·1 answer
  • The_provides access to the internet may also be internal​
    9·1 answer
  • Without a well-designed, accurate database, executives, managers, and others do not have access to the ____________________ they
    15·1 answer
  • Write a test program that creates two Rectangle objects—one with width 4 and height 40 and the other with width 3.5 and height 3
    5·1 answer
  • Which of the following is a public location that sells Internet access? Internet café Extranet Intranet LogMeIn,
    15·1 answer
  • Information systems include all of these
    5·1 answer
  • How would I collect a number from the user to use for the radius of a circle?
    13·1 answer
  • Why aren't my skullcandy bluetooth headphones connecting to my school chromebook if I turned on both the headphones and the blue
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!