1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xeze [42]
3 years ago
12

FIRST ANSWER GETS BRAINLIEST IM GIVING 30 POINTS!!!! Select the correct answer. Emma's project team has to create an application

within a short period of time. After a few considerations, the team decided to go ahead with the RAD model. How does the RAD model decrease development time? A. by using automated tools and reusing existing code B. by gathering all requirments in the first phase of the project C.by testing at the end of the life cycle D. by producing detailed documentation ​
Computers and Technology
1 answer:
kirill [66]3 years ago
5 0

Answer:

RAD model enables rapid delivery as it reduces the overall development time due to the reusability of the components and parallel development. ... Iteration time can be short with use of powerful RAD tools. Productivity with fewer people in a short time. Reduced development time.

You might be interested in
Which of the following is the best example of potential energy?
Otrada [13]
<span>Potential energy is the energy that is stored in an object due to its position relative to some zero position ,so the answer is " A runner positioned at the start line"</span>
6 0
3 years ago
Read 2 more answers
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
Gnoma [55]

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

<h3>How do hackers scan ports?</h3>

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

brainly.com/question/23294592

7 0
3 years ago
Ted is asked to create a page containing his family photos for a family reunion website. He will has about 20 pictures to post,
Dafna11 [192]

Answer:

<em>Alignment Attribute</em>

Explanation:

In web development (HTML), the align attribute <em>states the orientation according to the surrounding component of an < object > element.</em>

The element < object > is an insert element (it does not insert a new line on a page), which means that it can be wrapped around by text and other components.

Ted might find it easier to use this element / component to make sure his objects are well aligned.

Furthermore, defining the alignment of the < object > by the surrounding elements may be useful.

6 0
4 years ago
Does anyone know a way to skip the videos on Edgnuity?
Mazyrski [523]

Answer:

Yes, there is usually a skip button in the corner.

Explanation:

when i have to watch videos on there thats how i skip it

Hope this helps!!

7 0
3 years ago
Notice that the percentages range from just over 55% to just under 65%. This is a range of 10%, so we're going to use 5 evenly-s
vfiekz [6]

Answer:

import numpy as np

l_int = 55/100

h_int = 65/100

hist = np.histogram( paid_tax_preparers_list, bins=5, range=(l_int, h_int))

Explanation:

Numpy is a Python package used to ease mathematical and statistical research calculations. The package creates data structures called arrays that can be used as vector items, making it easy and fast for calculation to be done.

The np.histogram method is used to create or plot histograms of a list or array against the frequency of the items in the array. The bins and the range attributes are used to adjust the display of the histogram, with bins being the number of bin in the graph and range is the given length of the histogram.

7 0
3 years ago
Other questions:
  • Find an element inside a div using javascript
    12·1 answer
  • Which do switches create?<br> Networks<br> Wireless access points<br> Routes<br> Collision domains
    12·1 answer
  • Define the term unique key and give an example.
    6·1 answer
  • List three components of a computer system​
    10·1 answer
  • What is the difference between packet filtering and a proxy server?
    11·1 answer
  • What are the diffrent types of contract
    9·1 answer
  • When applying a filter to a text layer, how can you ensure that the types editability is not lost
    12·1 answer
  • It is generally safe to download mobile apps from<br>unknown sources.​
    9·2 answers
  • What will be the value of “sumtotal” when this code is executed?
    6·1 answer
  • Create five circles like the Olympic Rings. fill them with the colors given below
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!