1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
3 years ago
9

How are software myths affecting software process?. Explain with example​

Computers and Technology
1 answer:
Greeley [361]3 years ago
7 0

Answer:

A Software process is a Coherent set of activities for designing, specifying, implementing and testing software systems. A software myth propagates miss information and confusion

You might be interested in
7.4 Code Practice: Question 2
Nuetrik [128]

def GPAcalc(grade, weighted):

   grade = grade.lower()

   dictionary = {"a": 4, "b": 3, "c": 2, "d": 1, "f": 0}

   if weighted == 1 and grade in dictionary:

       return "Your GPA score is: "+str(dictionary[grade] + 1)

   elif weighted == 0 and grade in dictionary:

       return "Your GPA score is : "+str(dictionary[grade])

   else:

       return "Invalid"

print(GPAcalc(input("Input a letter grade: "), int(input("Is it weigthed? (1= yes, 0= no)"))))

I modified the code a bit to cut down on the use of if and elif statements. If you need me to change it, I will. Best of luck.

8 0
3 years ago
Jonathan works with a team of graphic designers. They have a collection of images and have divided the image editing work among
kondaur [170]

Answer:

A, USB

Explanation:

5 0
4 years ago
Read 2 more answers
Quinn recently launched a Display campaign for his women's clothing store. Since the launch, his website traffic has increased,
photoshop1234 [79]

<u>Full question:</u>

Quinn recently launched a Display campaign for his women’s clothing store. Since the launch, his website traffic has increased, but sales have remained flat. Which story shows Quinn using remarketing to drive action?

A. Quinn remarkets using his original business objectives and campaigns, with new users from an uploaded compatible list. By leveraging existing materials, he aims to extend his reach while saving cost.

B. Quinn creates a list of cart abandoners that identifies users who visited his website, considered buying his clothing, but didn’t purchase. He shows them an ad with a promotional discount code.

C. Quinn uses the In-Market audience segment for baking supplies with the intent of reaching potential customers while they’re actively browsing for women’s apparel and are close to a conversion.

D. Quinn creates a custom audience segment using keywords and URLs as inputs. He hopes to extend his audience to customers interested in women’s accessories.

Option B

Quinn creates a list of cart abandoners that identifies users who visited his website, considered buying his clothing, but didn’t purchase. He shows them an ad with a promotional discount code shows Quinn using remarketing to drive action

<h3><u>Explanation:</u></h3>

Remarketing is a manner of online advertising that allows sites to exhibit targeted ads to users who have previously hit their site. Remarketing consists of practicing special tracking code to order cookies on the browsers of somebody hitting your website and then assisting ads to those with that cookie.

Because Quinn is dispensing promotional discount code ads to the personality who hit his website, consider purchasing his clothing, but didn’t acquire. Remarketing lets you target those people who have toured your website or entered your app.

4 0
4 years ago
Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar. What will be the ou
lord [1]

Answer:

2

Explanation:

The output of the Java program is 2. The public Vehicle class is defined with the class variable 'counter'. When a Vehicle class object is instantiated, the counter variable increments by one.

In the program, the two instances of the class are created, incrementing the counter variable to two, the print statement outputs 2 as the result of the program.

8 0
3 years ago
________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate progr
Natasha2012 [34]

Answer:

Usurpation

Explanation:

In context of CIBS-210 it is known as Usurpation

6 0
3 years ago
Other questions:
  • Outlines are effective because they:
    8·2 answers
  • Which of the following techniques has to do with how the people who make the commercial manipulate the way it looks?
    8·1 answer
  • How to do assignment 5 on edhesive
    12·1 answer
  • In which scenario would you view Word data in Excel?
    11·1 answer
  • 6. When working with a file,
    9·1 answer
  • Which of the following are characteristics of centralized version control systems? Select 3 options.
    9·1 answer
  • The backbone networks of the Internet are typically owned by long-distance telephone companies called
    12·1 answer
  • What type of block start a sequence?
    12·1 answer
  • When delivering 2023 murano, demonstrate how to turn the driver assistance technologies on or off using ________.
    13·1 answer
  • The ability to present an effective message with useful content is obviously important to a good _____ presentation.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!