In the rapid application development (RAD) model, the _____ phase focuses on program and application development tasks similar to the SDLC.A) requirements planningB) user designC) constructionD) cutover

Answers

Answer 1

Answer:

C) construction

Explanation:

Rapid application development abbreviated RAD is an agile software development strategy that reduces time spent on planning so that prototype development takes priority and project turnaround time is greatly reduced consequently. There are four phases in rapid application development :

requirements planning, user design, construction, cutover

The construction phase is the third stage in rapid application development. This stage builds on the progress of the previous stages- the requirements planning stage and user design stage- to go ahead to finalize the application development which has been agreed on through iterations and communication between developer and client in the user design stage. In other words, this stage basically takes the ideas, prototypes and beta products from the previous stages and makes it into a real final product. The rationale or perks behind this is that other problems such as what product would do or look like or any changes or modifications have been worked out in previous stages thereby speeding up development in this stage.


Related Questions

uestion
7. If you want to learn how to perform an action, which feature of the Excel window should you use?

A. Quick Access toolbar
B. Tell Me box
C. Status bar
D. File tab

Please help ASAP

Answers

Answer:

B- tell me box

Explanation:

It tells you how to do something you don’t know how to do

Write a function that converts a string into an int. Assume the int is between 10 and 99. Do not use the atoi() or the stoi() function.

Answers

Answer:

Written in C++

#include <iostream>

#include <sstream>

using namespace std;

int main()  {

   string num;

   cout<<"Enter a number: ";

   cin>>num;

   stringstream sstream(num);

   int convertnum = 0;

   sstream >> convertnum;

   cout << "Output: " << convertnum;

}

Explanation:

Without using atoi() or stoi(), we can make use of a string stream and this is explained as follows:

This line declares a string variable num

   string num;

This line prompts user for input

   cout<<"Enter a number: ";

This line gets user input

   cin>>num;

This line declares a string stream variable, sstream

   stringstream sstream(num);

This line declares and initializes the output variable, convertnum to 0

   int convertnum = 0;

The stream is passed into the output variable, convertnum

   sstream >> convertnum;

This line displays the output

   cout << "Output: " << convertnum;

Note that: if user enters a non integer character such as (alphabet, etc), only the integer part will be convert.

For instance,

40a will be outputted as 40


Martin is responsible for translating the script into a visual form by creating a storyboard. Which role is he playing?
Martin is playing the role of a(n)

Answers

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

The question is about to  identify the role of Martin, who converts script into visual form by creating a storyboard.

The correct answer to this question is:

Martin is playing the role of Production Design and he is working at the position of the production designer.

Before shooting a film, the production designer is the first artist who converts script into a visual form such as creating storyboards. And, that storyboard serves as the first film draft.

A storyboard is a series of sketches, paintings, etc arranged on a panel to show the visual progress of the story from one scene to the next.   These storyboards are used from start to finish of the film. Because these storyboards or sketches serve as the visual guide for the director of the film throughout the production.  

Answer:

Hi

Explanation:

THE ANSWER UP TOP IS WRONG LIKE DEAD WRONG

Using Python Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.

Sample output with input: 17
Not special number

Answers

special_num = int(input())

if special_num == -99 or special_num == 0 or special_num == 44:

   print("Special number")

else:

   print("Not special number")

I wrote the code so that the user enters a number of their choice. Best of luck.

You are troubleshooting an issue where a PC can reach some hosts on the Internet (using either DNS name or IP address), while several other hosts on the Internet are not reachable. From the PC you can Ping all devices on your local subnet. What is most likely causing the problem?

Answers

The options are missing from the question,below are the options to choose from;

A) incorrect (or missing) routes in a routers routing table

B) incorrect DNS configuration on the PC

C) incorrect default gateway configuration on the PC

D) duplicate IP addresses on your LAN

Answer: The correct answer to the question is option A

INCORRECT (OR MISSING) ROUTES IN A ROUTERS ROUTING TABLE.

Explanation: When it is possible for a PC to ping some devices but not actually all,we can then make an assumption that either it has a wrong subnet that is configured or the router from the path to the remote device actually has an incorrect or a missing routes to the device.

How goes design again ones attention?

Answers

Answer:

the only thing i could think of is creating a different way to get someone to pay attention to you like maybe instead of shouting or tapping on ones shoulder maybe try to ask the person closest to them to get their attention for you. or by doing something extremely impressive or distracting

Explanation:

Right now I have an i5 2400 and a PYN XLR8 gaming GTX 1650 Super, my CPU is too weak for 1080p gaming, what CPU should I get that has a B75 LGA 1155 socket, or Overclock it if so how many GHz should I overclock it to
(I only have a stock cooler)

Answers

Answer:

if its a number you need 5600GHz but im not to sure

Explanation:

Answer:

answer

Explanation:

if it a number you need 5600GHz but it not I'm not sure

What are the ten main components of a report that would be delivered at the end of a data science project?

Answers

Answer:

The answer is below

Explanation:

The ten main components of a report that would be delivered at the end of a data science project are the following:

1. Cover page: the involves elements such as the title of the project, the name of the author, name of institution, date of publication

2. Table of Contents: this comprised information like chapters, topics, and subtopics

3. Abstract: a summary of the whole project

4. Introductory Section: a brief background study

5. Methodology section: this describes the methods used in gathering and analyzing the data

6. Data section: this shows the data gathered for the project. It is mostly represented in tables, histograms, pie charts, etc.

7. Analysis section: this describes what was analyzed

8. Result section: this described the outcome of the analysis

9. Conclusion section: this describes the whole outcome of the data project and what the author derived or concluded.

10. References: this describes the information about the works of other authors, the author used in building his background knowledge towards his data science project.

Are the blank space around the edges of the page

Answers

Answer:

The blank space around the edges of a sheet of paper — as with the page of a book — that surrounds the text is called the margin.

what is the purpose of the new window command

Answers

Answer:

.

Explanation:

Answer:

It opens one of the current worksheets into a new window.

Explanation:

got it correct

How does natural gas move through pipelines from the well head to the end user thousands of miles away

Answers

It’s the large compressors that are pumping and working together through the different stations ... They move the gas through the pipelines which they’re under high pressure.

Which traits are common in all four career pathways of the Information Technology field? Check all that apply.

A)accuracy and attention to detail
B)problem-solving and critical-thinking skills
C)knowledge of programming language
D)ability to work independently
E)ability to protect confidential information
F)ability to learn quickly

Answers

I would say all of the above

Answer:

Abcd

Explanation:

how is the information technology Career Cluster different from the others clusters?

Answers

Answer:

All career clusters use information technology in carrying out their work.

Explanation:

How is the Information Technology career cluster different from most other clusters?

All career clusters use information technology in carrying out their work.

I saw this on quizlet, hope this helps!

If a function receives an object as an argument and needs to change the objects member data, the object should be:_____________.

Answers

Question

If a function receives an object as an argument and needs to change the objects member data, the object should be:_____________.

A) passed by constant reference

B) passed by reference

C) passed by value

D) none of the above

Answer:

The correct answer is B)

Explanation:

The above question relates to computer programming.

Passing by reference is the same and can be used interchangeably with  passing by address.

A special ID used by a computer's procesing unit for recording or tracking data is referred to as a memory address.

When the memory address of a calling function is passed on to the function, the function is said to have been passed by address or reference.

This enables changes to be made to the function or argument directly from the parameter.

Cheers

In the Allow list box in the Data Validation dialog box,the _____ option means that the cell will accept only times.A) ChronologyB) ClockC) TimeD) Calendar

Answers

Answer:

C) Time

Explanation:

Given that Data validation is a feature in Microsoft Excel in which a user used to specify or determines the type of value or characters that can be typed or entered into a cell.

For example, using data validation to ensure a value of a number is whole numbers, or to ensure character entry is less than 25 characters.

Hence, in this case, the correct answer is the TIME option, will only result in cell accepting only times.

While working on a customer issue, your colleague calls and asks for help to resolve his issue. What should you do?A. Go ahead and resolve his situation first B. Request the colleague to call after sometime C. Work on both the issues at the same time D. Tell your colleague to work on his own.

Answers

Answer:

Request the colleague to call after sometime

Explanation:

While working on a customer issue, your colleague calls and asks for help to resolve his issue. What should be done is to "Request the colleague to call after some time."

This is because,e in situations like that, it is believed that the customer should come first, and that is the purpose of being there. For employee to serve the customer. A colleague can easily link up with other employees to get his issues sorted, or simply wait.

express cards functionalities​

Answers

Answer:

ExpressCard, initially called NEWCARD, is an interface to connect peripheral devices to a computer, usually a laptop computer. The ExpressCard technical standard specifies the design of slots built into the computer and of expansion cards to insert in the slots.

E-mails could possibly cause harm to computers due to which of the following?
A.Allow for misunderstandings
B.Carrying viruses
C.Updating system preferences
D.Allowing for global use

Answers

D or b
I’m pretty sure sorry if I’m wrong

E-mails could possibly cause harm to computers due to carrying viruses option (C) is correct.

What is a computer?

A computer is a digital electronic appliance that may be programmed to automatically perform a series of logical or mathematical operations. Programs are generic sequences of operations that can be carried out by modern computers.

As we know,

You receive emails every day with papers, pictures, or other electronic files attached. These files can occasionally include harmful viruses, Trojan horses, or malware that has been purposefully provided by someone looking to inflict harm or steal confidential personal data.

Thus, E-mails could possibly cause harm to computers due to carrying viruses option (C) is correct.

Learn more about computers here:

brainly.com/question/21080395

#SPJ2

Please help I don’t know

Answers

Answer: Go down 1 time, then to the left 3 times, then down 1, finally, go left 1 time.

Explanation:

What is output?

C = 1
sum - 0
while (c < 10):
c = c + 3
sum = sum + c

print (sum)​

Answers

11

Explanation:

Please make me Brainliest

_decisions are more common at lower organizational levels

Answers

Which of the following is not a characteristic of a structured decision?

The first three phases of the decision-making process need not occur in any particular sequence.

Structured

________ decisions are more common at lower organizational levels.

Operational control

_____ is the efficient and effective execution of specific tasks.

unstructured

When there is no well-understood or agreed-on procedure for making a decision, the decision is said to be:

Users didn't have the right tools to access the data.

Refer to the Opening Case - Quality Assurance at Daimler AG: Which of the following best describes Daimler's Quality Information System (QUIS)?

digital dashboards

Which of the following information systems are very user friendly, supported by graphics, and provide exception reporting and drill down?

The number of alternatives is decreasing.

Which of the following is not a reason why managers need IT support?

implementation

Success in the _____ phase of the decision-making process results in resolving the original problem, and failure leads to a return to previous phases.

interpersonal

Being a figurehead and leader is part of the _____ managerial role.

what are the principle elements of public key cryptosystem​

Answers

Answer: Components of a Cryptosystem

- Plaintext. It is the data to be protected during transmission.

- Encryption Algorithm. ...

- Ciphertext. ...

- Decryption Algorithm, is a mathematical process, that produces a unique plaintext for any given ciphertext and decryption key. ...

- Encryption Key. ...

- Decryption Key.

Explanation:

This elementary problem begins to explore propagation delay and transmis- sion delay, two central concepts in data networking. Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters, and suppose the propagation speed along the link is s meters/sec. Host A is to send a packet of size L bits to Host B

a. Express the propagation delay, dprops in terms of m and s

b. Determine the transmission time of the packet, drans, in terms of L and R.

c. Ignoring processing and queuing delays, obtain an expression for the end-

d. Suppose Host A begins to transmit the packet at time t = 0. At time t = dtrans'

e. Suppose drop is greater than dran . At time t = d, ans, where is the first bit of

f. Suppose dprop is less than dtrans. At time t = dtrans, where is the first bit of

g. Suppose s = 2.5-108, L = 120 bits, and R = 56 kbps. Find the distance m so that dprop equals drans

Answers

Answer:

A. dprops = m /s seconds.

B. drans = L / R seconds.

C.  delay(end −to−end) =  (m /s + L / R) seconds.

D. The bit has just been sent to Host B or just left Host A.

E. The first bit is in the link and has not reached Host B.

F. The first bit has reached Host B.

G. m = 535.714 km.

Explanation:

The transmission time or delay of packets in a network medium is the packet size L, divided by the bit rate R (in seconds). The propagation time or delay is the ratio of the distance or length of the transmission cable, m, and the propagation speed of the cable, S (in seconds).

The end-to-end delay or the Packet delivery time is the total delay in transmission, which is the sum of the propagation delay and the transmission delay.

To get the distance where the propagation delay is equal to the transmission delay;

distance (m) = L /R  

= (120/56 ×10^3) 2.5 ×10^8   = 535.714 km

Which of the following represent the use of formatting to create readable code?
Choose all that apply.

Line breaks are used to separate every ten lines of code.

Line breaks are used to separate segments of code.

Indentation is used to create a pattern that is easy to follow.

Indentation is used to make it easier to follow the flow of logic in the code.

Answers

Answer:

The true statements are:

Line breaks are used to separate segments of code.

Indentation is used to create a pattern that is easy to follow.

Indentation is used to make it easier to follow the flow of logic in the code.

Explanation:

Line breaks and indentation are used to increase the readability of a program. The coding formatting is done using the line breaks and indentation to separate segments of code so that the code is easier to read.

Hence,

The true statements are:

Line breaks are used to separate segments of code.

Indentation is used to create a pattern that is easy to follow.

Indentation is used to make it easier to follow the flow of logic in the code.

Answer:

b and d

Explanation:

If a student passes off an author’s work as his or her own, the student has

Answers

Plagiarism is the answer

Suppose that one of the following control signals in the single-cycle MIPS processor has a stuck-at-0 fault, meaning that the signal is always O, regardless of its intended value. What instructions would malfunction? Why? (a) RegWrite (b) ALUOp1 (c) MemWrite Repeat for all three signals (a) to (c) above, assuming that the signal has a stuck-at-1 fault.

Answers

Answer:

Explanation:

RegWrite:

• All R-type instructions, lw and addi:

• The result of the operation/load/addition would not be written back to the destination register

• ALUOP

• The following R-type instructions: add, sub, and, or, slt

• With ALUOp stuck at 0, the ALU decoder would interpret all those instructions as either add or subtract operations. The ALUOp gets decoded to add or subtract depending on ALUOp[0].

• MemWrite:

• Only sw is affected.

• The memory write won’t take place.

PLS HELP IF U KNOW A LOT ABT SOCIAL MEDIA

Idk what’s going on with Pinterest but I can’t follow ppl, dm ppl or comment on stuff and it says an error (attached image) what can I do to fix this? Also I’ve tried logging in and out and I’ve tried deleting the app. Btw it’s on a business account

Answers

Answer:

Its probably your computer

Explanation:

Try restarting, shutting down and starting back up your computer/laptop. Or just move to a different device.

Any suggestions on how to write the following Python code?


1. Write a Python code to save the following list in a CSV file

ls = [“Hello”, “Hi”, “bye”]

2.Write a Python to read the CSV file generated in the previous step (1) to a Python list.

Help would be much appreciated.

Answers

Answer:

Hi

Explanation:

What is the extension of Qbasic ?​

Answers

Answer:

bas

Explanation:

Which kind of storage has a spinning platter?

magnetic hard disk

O server

O solid state hard disk

O cloud

Answers

Answer:

Magnetic hard disk

Explanation:

The type of storage that has a spinning platter is called MAGNETIC HARD DISK reason been that MAGNETIC HARD DISK are made up of one or more disks that are been covered with a magnetic coasting or magnetic material to help store information or data permanently on a desktop or a computer and lastly this type of disks help to read data and as well write and rewrite data.

Other Questions
What's the difference between the clothes Hester makes for herself and the clothes Hestermakes for her baby? which phrase best completes the diagram? HELP ME PLEASE!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! A _________________________ is used to join a dependent clause to an independent clause. *subordinating conjunctioncoordinating conjunctionclausefanboy 2/5(5 + x) = 8What is x if the equation equals 8 I NEED TWO ARTICLES (SCHOLARLY) BASED ON THIS PLEASE. How are the findings, research methods, or theories impacted by diversity? Diversity can include but is not limited to, differences in age, race, ethnicity, culture, gender, socio-economic status, disability, and sexual orientation. Include research findings showing how two diverse populations are similar or dissimilar in their experience of stress or stressors in college students. Please help with this Why do some people NOT believe in god pls help me answer this, thanks PLSS HELPPWhat can be said about living organisms and those in the fossil record?All organisms are more or less the same as their ancestors in the fossil record. Most organisms are the same as their ancestors in the fossil record. Some organisms are very different. Organisms are generally much different from their ancestors in the fossil record. Some organisms are much different from their ancestors in the fossil record, while other organisms have mostly stayed the same. i need help with this Calculate the Molarity when a 6.11 mL solution of 0.1 H2SO4 is diluted with 105.12 mL of water Bedford of Delaware believed that if the large states continued to crush the smaller States the smaller States would seek aid from who? An energy bill indicates that the customer used 1024 kWh in July. How many joules did the customer use? What was the purpose of the first written languageA.to increase tradeB.to help people fightC.to improve record keepingD.to reduce political tensionsE.other( if you chose other please write the answer ) Unit 5 - Modifiers Name_____________________ READ: Direct Object: Receives the action of the verb. Answers the question WHAT? It will always be a noun or pronoun. Adjective: Modifies a noun/pronoun. Answers the questions which one, what kind, how many Adverb: -Modifies an action verb. Answers the questions where, when, how the action occurs -Modifies an adjective or other adverb. Tells to what extent Adjective Phrase: prepositional phrase that acts like an adjective. (see adjective notes above) Adverb Phrase: prepositional phrase that acts like an adverb. (see adverb notes above) Using KAMI, Label each sentence (S, AV, DO, ADJ, ADV and highlight phrases Adj,(green) & Adv (blue) S AV ADV ADJ DO EX) The dog in my yard ate the very big bones from the pork roast during dinner. +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1. The player in the red jersey ran around the bases. 2. Members of my family donated money yesterday to our church. 3. Mice throughout the barn are easily stealing cheese from the small children. 4. My extremely handsome husband stirred the boiling spaghetti before dinner. 5. The precious child gave his loving mother a hug at bedtime. The most important function of nucleic acids is How can you tell that the inequality 3x - 1 > 3x + 2 has no solution just by looking at the terms in the inequality? Please help. I cant do math! What are some conflicts or issues surrounding immigration and multilateralism in the U.S. and the world? Can these issues be resolved? Why or why not? what is (567x237)x(467x939)i will mark brainliest