1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
5

Software design and implementation are interleaved activities. The level of detail in the design depends on the type of system b

eing developed and whether you are using a plan-driven or agile approach. True or false?
Computers and Technology
1 answer:
zavuch27 [327]3 years ago
5 0

Answer:

True is the correct answer for the above question.

Explanation:

  • The software design consists of several phases which are also called the life cycle. It is used to develop the software.
  • But there are so many models, that consist of rules and guidelines to states how these phases can work. It states that in which steps of the designing phase, which part of the life cycle works.
  • For example, in the waterfall model, all phases work on a single time and there is no option to follow this in reverse scenario and in the agile model only one module is developed and proved by the client.
  • So the style of the phase can state the model, which is followed in the software development process.
  • This above concept can also be started from the question. Hence True is the correct answer.

You might be interested in
Whats the relationship between the CPU and motherboard
Mashcka [7]

Answer:

Both perform processes vital to running the computer's operating system and programs -- the motherboard serves as a base connecting all of the computer's components, while the CPU performs the actual data processing and computing.

Explanation:

6 0
3 years ago
Who share the road with an impaired driver are at risk
bonufazy [111]
All drivers

All drivers who share the road with an impaired driver are at risk.
8 0
3 years ago
Read 2 more answers
Consider a system running ten I/O-bound tasks and one CPU-bound task. Assume that the I/O-bound tasks issue an I/O operation onc
Dmitriy789 [7]

Answer:

10 minutes

Explanation:

3 0
3 years ago
Suppose that you are asked to modify the Stack class to add a new operation max() that returns the current maximum of the stack
Advocard [28]

Answer:

Following are the code to the given points:

Explanation:

For point 8.1:

public String max()//defining a method max

{

   String maxVal=null;//defining a string variable that holds a value

   for(int x=0;x<n;x++)

   {

       if(maxVal==null || a[i].compareTo(maxVal)>0)//defining if blok to comare the value

       {

           maxVal=a[i];//holding value in maxVal variable

       }

   }

   return maxVal;//return maxVal variable value

}

For point 8.2:

public void push(String item)//defining a method push that accepts item value in a parameter

{

       a[n]=item;//defining an array to hold item value

       if(n==0 || item.compareTo(maxVals[n-1])>0)//use if to comare item value

       {

               maxVals[n]=item;//holding item value in maxVals variable

       }

       else

       {

               maxVals[n]=maxVals[n-1];//decreasing the maxVals value

       }

       n++;//incrementing n value

}

public String pop()//defining a method pop

{

       return a[--n];//use return value

}

public String max()//defining a method max

{

       return maxVals[n-1];//return max value

}

  • In the first point, the max method is declared that compares the string and returns its max value.
  • In the second point, the push, pop, and max method are declared that works with their respective names like insert, remove and find max and after that, they return its value.
7 0
3 years ago
What could prevent ping or traceroute responses from reaching the originating device beside network connectivity issues?
zysi [14]
Many admins set their firewalls to drop echo-request packets to prevent their networks from being mapped via "Ping Sweeps".

A remote possibility is that there's too many hops between the source and target and the packet's TTL expires.
3 0
3 years ago
Other questions:
  • Famed science fiction writer H. G. Wells once envisioned something to store vast amounts of information. What did he call it?
    15·2 answers
  • 24 bit or 16 million colors is often called?
    7·1 answer
  • The code int *p; declares p to be a(n) ____ variable. new
    8·1 answer
  • Advantage and disavantage of malware maintenance
    12·1 answer
  • What enables a website to recognize a computer as a return visitor (as opposed to a first-time visitor)?
    12·1 answer
  • What is the forging of the return address on an email so that the email message appears to come from someone other than the actu
    11·1 answer
  • The term that refers to the standard computer language for creating web pages is called:
    6·1 answer
  • How does Shakespeare immediately introduce Tybalt as a menacing character?
    9·1 answer
  • Write a python program that should determine from the range you choose to enter :
    9·1 answer
  • Write a program to find the sum of first 10 even numbers in qbasic​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!