1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
5

Software design and implementation are interleaved activities. The level of detail in the design depends on the type of system b

eing developed and whether you are using a plan-driven or agile approach. True or false?
Computers and Technology
1 answer:
zavuch27 [327]3 years ago
5 0

Answer:

True is the correct answer for the above question.

Explanation:

  • The software design consists of several phases which are also called the life cycle. It is used to develop the software.
  • But there are so many models, that consist of rules and guidelines to states how these phases can work. It states that in which steps of the designing phase, which part of the life cycle works.
  • For example, in the waterfall model, all phases work on a single time and there is no option to follow this in reverse scenario and in the agile model only one module is developed and proved by the client.
  • So the style of the phase can state the model, which is followed in the software development process.
  • This above concept can also be started from the question. Hence True is the correct answer.

You might be interested in
Which amendment applies to the following scenario? “Brian attended church with his two daughters and wife on Sunday." A First B
iragen [17]

Answer: First Amendment

Explanation:

The First Amendment gives individuals the freedom of speech and the right to proactive any religion that they want. It also allows the people have a peaceful protest.

The swcud amendment gives people the right to keep arms. The Fourth hinders individuals from being searched without a warrant.

Therefore, the answer is First Amendment.

4 0
3 years ago
The ______________________ is the part of the ip address that is the same among computers in a network segment.
kozerog [31]
The answer is 
External IP address.
4 0
3 years ago
Who want followers on Instagram... gotta follow back
Alexxx [7]

Explanation:

I dont have Instagram....

6 0
3 years ago
Read 2 more answers
3. By default, Blender® remembers your last 32 actions and allows you to undo them one at a time by pressing CTRL+Z. (1 point)
Setler [38]
Answers:

(3) True
(4) Num Lock

Explanations:
(3) To undo any task in most of the softwares including Blender, CTRL + Z is used. If you want to double check, go to preference ->  Input -> Search for undo. You would see CTRL + Z shortcut there for one time undo (as shown in the picture 1 attached.) Hence (TRUE).

(4) As in blender, during the scene creation, the designers usually use top, left, right or bottom view. Blender has the built-in keys set for those views. As you can see in the second image that the Top view is set to NumPad 7 (likewise others set to other numbers). In order to use the those numpad numbers, you must turn on the NumLock! Hence NumLock is the answer.

3 0
3 years ago
In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
Natasha_Volkova [10]

Answer:

Caesar cipher

Explanation:

In formation technology, cryptography or cryptology is a process of coding or encrypting information, using algorithms and input values in a network, where there is a present of a third party called adversaries or attackers.

There are different types of cryptography, namely, symmetric, assymmetric and hash cryptography.

Ciphers are algorithms used in cryptography to encode (encrypt) or decode (decrypt) information. An example of cipher is the Ceasar's cipher.

Ceasar cipher is a simple type of substitution cipher that encrpts plain text one character at a time and each coded character depends on the single character and a fixed distance value.

4 0
3 years ago
Other questions:
  • What do you call the combination of title, description, tags, and thumbnail?
    6·1 answer
  • By default, the windows desktop display
    12·1 answer
  • A. True <br> b. False: variables represent storage locations in the computer's memory.
    13·1 answer
  • The ___________________ Act makes it illegal to deactivate or otherwise disable any antipiracy technologies including DRM techno
    7·1 answer
  • A major difference between digital librarians and traditional librarians is that traditional librarians rarely work with people.
    15·2 answers
  • A new drug to combat acne has been developed from a compound that is found in a melon. Which scientists would contribute to the
    15·2 answers
  • Defensive programming is sometimes referred to as _________.
    5·1 answer
  • What happens if none of the selector values match selector in a simple case expression in pl/sql
    6·1 answer
  • A group of developers for a startup company store their source code and binary files on a shared open-source repository platform
    14·1 answer
  • Create a basic program that accomplishes the following requirements: Allows the user to input 2 number , a starting number x and
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!