1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bearhunter [10]
3 years ago
10

HELP PLEASE!!!! Which development method is best explained in this way: developing a system through repeated cycles and smaller

portions at a time, enhancing and evolving the system over time?
Incremental method
Rapid prototyping method
Spiral method
Waterfall method
Computers and Technology
1 answer:
vlada-n [284]3 years ago
8 0

Answer:

Incremental method.

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

An incremental model refers to the process in which the requirements or criteria of the software development is divided into many standalone modules until the program is completed.

Hence, an incremental method typically involves developing a system through repeated cycles and smaller portions at a time, enhancing and evolving the system over time.

In SDLC, a waterfall model can be defined as a process which involves sequentially breaking the software development into linear phases. Thus, the development phase takes a downward flow like a waterfall and as such each phase must be completed before starting another without any overlap in the process.

Also, a spiral model can be defined as an evolutionary SDLC that is risk-driven in nature and typically comprises of both an iterative and a waterfall model. Spiral model of SDLC consist of these phases; planning, risk analysis, engineering and evaluation.

You might be interested in
Select the correct answer.
Gnesinka [82]

Answer:

D.

Explanation:

I think.

4 0
2 years ago
You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workst
Aleksandr-060686 [28]

Answer:

PING

Explanation:

To check if there's still connectivity between the computer and server, I would use the ping command.

The ping command is primarily a TCP/IP command. What this command does is to troubleshoot shoot. It troubleshoots connection and reachability. This command also does the work of testing the name of the computer and also its IP address.

4 0
3 years ago
Why do we need the system requirements for Adobe photoshop?
babymother [125]
I’m sorry and I do not know I just need credits thank have a nice day
7 0
3 years ago
What is tnylnk? I keep seeing people leave answers with this.....can someone explain what this is, please...I might give brainie
Naddika [18.5K]

Answer:

ITS A SCAM IT DOWN LOADS NASTY STUFF ON TO UR COMPUTER

Explanation:

hope this helps

8 0
3 years ago
Read 2 more answers
Memorex Disks sells computer disk drives with right-of-return privileges. Returns are material and reasonably predictable. Memor
pychu [463]

Memorex should: iv. record a refund liability in the year of the sale.

<h3>What is a right-of-return privilege?</h3>

A right-of-return privilege can be defined as a special right, advantage or entitlement that is accorded to a customer, which avails them an opportunity to return a product they have purchased.

Since Memorex Disks offers its customers right-of-return privileges, it is expected that it should record a refund liability in the year of the sale i.e recording an allowance for sales returns in the year the sale was made.

Read more on right-of-return privilege here: brainly.com/question/17165436

#SPJ1

5 0
2 years ago
Other questions:
  • In a database, a collection of related fields that describes some object or activity is referred to as a ____.
    9·1 answer
  • Virtually all webcams plug into a(n) ________ port.
    13·2 answers
  • Search the internet for news of a motor vehicle collision in your community involving drugs or alcohol. Keeping in mind that you
    8·1 answer
  • The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
    7·1 answer
  • In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob.
    12·1 answer
  • Write a Temperature class that will hold a temperature in Fahrenheit and provide methodsto get the temperature in Fahrenheit, Ce
    14·1 answer
  • How many of yall are willing too sub to my channel called "Space Juice" with around 200 subs?!​
    6·1 answer
  • Free 35 points!!!
    11·2 answers
  • What is a personal data?
    12·1 answer
  • he primary purpose of a database query is to a. find and retrieve specific information. b. correct information in the database.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!