1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
5

Software design and implementation are interleaved activities. The level of detail in the design depends on the type of system b

eing developed and whether you are using a plan-driven or agile approach. True or false?
Computers and Technology
1 answer:
zavuch27 [327]3 years ago
5 0

Answer:

True is the correct answer for the above question.

Explanation:

  • The software design consists of several phases which are also called the life cycle. It is used to develop the software.
  • But there are so many models, that consist of rules and guidelines to states how these phases can work. It states that in which steps of the designing phase, which part of the life cycle works.
  • For example, in the waterfall model, all phases work on a single time and there is no option to follow this in reverse scenario and in the agile model only one module is developed and proved by the client.
  • So the style of the phase can state the model, which is followed in the software development process.
  • This above concept can also be started from the question. Hence True is the correct answer.

You might be interested in
A switch is a central network device that connects network nodes such as workstations and servers in a physical ____ topology
Black_prince [1.1K]
<span>A switch is a central network device that connects network nodes such as workstations and servers in a physical Star topology</span>
8 0
3 years ago
What is x squared times b squared
Pie

Answer:

x^2 * b^2

Explanation:

Like 3 squared times 2 squared is 3*3*2*2. Similarly the expression given in the question is equal to x*x*b*b. And that explains what is mentioned in question.

3 0
3 years ago
A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
Charra [1.4K]

Answer: Yes

Explanation:

Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system

  • According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.  
  • Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
8 0
3 years ago
When you sustain program implementation by staying true to the original design, it is termed A. Goals and objectives B. Program
Naya [18.7K]

Answer:

Program fidelity

Explanation:

7 0
3 years ago
Which technology concept uses computer resources from multiple locations to solve a common problem?​
umka2103 [35]

Answer:

Distributed memory systems

Distributed memory systems use multiple computers to solve a common problem, with computation distributed among the connected computers (nodes) and using message-passing to communicate between the nodes.

Explanation:

5 0
3 years ago
Other questions:
  • What is an independent data mart?
    8·1 answer
  • Which command can be used to manually add a package to the driver store?
    13·1 answer
  • Some people are unable to arrange six matches to form four equilateral triangles because they fail to consider a three - dimensi
    6·1 answer
  • What are parts of the prewriting process
    8·2 answers
  • PowerPoint displays many that are varied and appealing and give you an excellent start at designing a presentation. However, you
    15·1 answer
  • When searching for an image on your computer, you should look for a file with which of the following extensions?
    8·1 answer
  • How are special characters added to a Word document? Check all that apply.
    6·2 answers
  • What is the extension of a Microsoft access database 2013​
    7·2 answers
  • If you had tickets for the concert and saw these alerts, what should you do?
    12·1 answer
  • Why is experience in their own factory setting
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!