1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melomori [17]
2 years ago
10

Which development model emphasizes small revisions that enhance the code and expand the functionality until the entire program i

s built
Computers and Technology
1 answer:
algol [13]2 years ago
5 0

Answer:

Iterative

Explanation:

is the model that emphasizes small revisions, unlike waterfall which is in a linear sequential flow.

You might be interested in
How to design remote access policy using the appropriate access controls for systems,applications, and data access
nata0808 [166]

Answer:

All remote access users connect to the network and maintain all security standards on the device including

Valid and virus protection

Malware protection

Maintain the OS

Explanation:

The remote access policy applies to employees and other affiliates who owned devices to remotely access the Network CCC. The remote policy access connection is used to perform the work activities on the behalf of CCC. Remote access system, application and can be accessed with the internal CCC network. Example of application are as follow:

Internal Academic System

Internal websites

Documents files on internal file

Local colleges resources

Servers

Remote access will be managed by System Data Center and use security measures based on requirements.

Remote access is provided as an extension of the normal work environment.

Review the CCC information technology for protecting information via the remote method.

The employee will use remote procedures. Employees disclose the passwords and if the business is conducted from home.

All remote access includes a "time-out" system. In accordance with CCC and will time out the specified period of inactivity.

The access users accept the access and connection to networks and monitored to record dates, time. Identify accounts and have been compromised by external parties.

The remote access user may be listed in the remote access application.

4 0
3 years ago
While the Internet is used to share many useful services and information, there are growing concerns about the way that the Inte
natulia [17]

Answer:

A true!

Explanation:

3 0
2 years ago
What is conference proceeding​
Archy [21]

Answer:

conference proceeding is a collection of academic papers published in the context of an academic conference or workshop.

3 0
2 years ago
Read 2 more answers
Can you explain the difference between software and hardware? Tell me 3 examples of each one.
solniwko [45]

Answer:

Hardware like a CPU computes the things like a painting software but the painting software is just a platform to draw things as it doesn't have any purpose without the hardware as it can't be ran. A GPU is a gaming processing unit to process the 3D Environment or a 2D Game Or to render 3d objects.

Explanation:

5 0
2 years ago
The idea generating technique most often used in writing business letter is ?
aivan3 [116]
Hihi!

The correct answer is free writing! Free writing <span>is a prewriting technique in which a person writes continuously for a set period of time without regard to spelling, grammar, or topic! People tend to use it because it produces raw, often unusable material, but helps </span>writers<span> overcome blocks of apathy and self-criticism!</span>

I hope I helped!
-Jailbaitasmr
6 0
3 years ago
Read 2 more answers
Other questions:
  • MTTF is a file format developed by Microsoft commonly used on Windows systems; it offers file security, large volume size, large
    11·1 answer
  • Identify the four basic categories of hardware in a microcomputer system. system unit, modem, ram, and microprocessor system uni
    5·1 answer
  • Which fingers should you use to type the reach keys?
    12·1 answer
  • A porta power tool is what kind of tool
    9·1 answer
  • A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and stor
    9·1 answer
  • You have created a PivotChart showing sales by quarter by sales rep. Before presenting it to management, you notice thename of a
    7·1 answer
  • What is the meaning of <br>computer<br>viruses ?​
    8·1 answer
  • Select the correct answer. Which is the bottom-most layer in the OSI model?
    9·1 answer
  • Hey! PLEASE HELP!!!
    12·1 answer
  • which term describes the layer of software that resides between the virtual operating system and the physical hardware it runs o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!