1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
artcher [175]
3 years ago
9

What does NOT match with Agile Manifesto?

Computers and Technology
1 answer:
Butoxors [25]3 years ago
7 0

Answer:

yes

Explanation:

You might be interested in
How was kapilvastu named​
mixas84 [53]

Answer:  Kapilvastu was named after Vedic sage Kapilamuni

4 0
3 years ago
If you find yourself boxed in by a vehicle on your left or right _____________
Zepler [3.9K]

Answer: A. speed up or slow down briefly

Explanation:

put that and then i saw someone said b and it was wrong and i got mad because it was the only answer i got wrong. but it’s a

4 0
2 years ago
Read 2 more answers
_______________ is the term for the convergence of real-time and non-real-time communications services such as telephony, instan
Anna007 [38]

Answer:

Unified communications

Explanation:

Unified communications is the term for the convergence of real-time and non-real-time communications services such as telephony, instant messaging, video conferencing, speech recognition, voice mail, and email into a single interface.

8 0
3 years ago
The 8086 was divided into two main parts. The _____ was the "brain" of the processor, and had the ALU, general-purpose register,
jonny [76]

Answer:

1.Execution Unit.  2.Bus interface unit

Explanation:

3 0
3 years ago
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
iogann1982 [59]

Answer:

a. Security tab

Explanation:

These options would be under the security tab. The security tab allows you to protect yourself when browsing the web. It includes features such as cookies, location, pop-up blocker and tracking protection. This allows you to avoid harmful or malicious content. In this example, your coworker wants to minimize attacks when using the Internet. Therefore, this is the tab that would help her the most.

7 0
3 years ago
Other questions:
  • Why is timbre an important musical element?
    7·2 answers
  • If you are working on a document and want to have Word automatically save the document every minute, what steps should you use t
    13·1 answer
  • Hiiiiiiiiiii hiiiiiiiiiiiiiiiiiii
    9·2 answers
  • Although “dog.jpg” and “dog.JPG” and “Dog.jpg” and “DOG.JPG” all appear to be the same file, they are not considered the same wh
    6·1 answer
  • A Tracking Gantt chart is based on the percentage of work completed for project tasks or the actual start and finish dates. True
    12·1 answer
  • Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rates R1 = 500 kbps, R2
    14·1 answer
  • Where on the internet can you find a site that will allow you to tour bill gates mansion
    8·2 answers
  • Write an algorithm to show whether a given number is even or odd.
    14·1 answer
  • What is output?
    13·1 answer
  • PLS HEEELLLP ASAP, DONT JOKE
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!