Question

Question one Evolutionary and throw-away prototypes can be used in software development. Explain situations where you...

Question one

  1. Evolutionary and throw-away prototypes can be used in software development. Explain situations where you can use each of the prototypes.                             [8]
  2. Explain why programs which are developed using evolutionary development are likely to be difficult to maintain                                                                              [8]
  3. Explain the differences between user requirements and system requirements           [4]

Homework Answers

Answer #1

Oues1(a):Evolutionary and throw-away prototypes can be used in software development. Explain situations where you can use each of the prototypes.  

Ques1(b):Explain why programs which are developed using evolutionary development are likely to be difficult to maintain                                                                             

ques1(c):Explain the differences between user requirements and system requirements   

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
            Students need to understand the concepts of the following software process models: Waterfall is the...
            Students need to understand the concepts of the following software process models: Waterfall is the first methodology generally acknowledged as being dedicated to software development. Its principals are for the first time described by Winston W. Royce even though the actual term waterfall is not used in the article. It emphasizes meticulous planning and it outputs comprehensive documentation. The Waterfall methodology is linear sequential process where every stage starts only after the previous has been completed. Each stage has...
QUESTION 4 Reference management software packages provide a link between electronic bibliographic databases, located in places...
QUESTION 4 Reference management software packages provide a link between electronic bibliographic databases, located in places like a biomedical library or on the Internet, and a reference library on your own computer. Reference management software such as EndNote or RefWorks uses the term reference library. In the Matrix Method, this is the same as the Documents folder. True False QUESTION 5 Location labels describe where you keep your reprints or other source documents. These location labels provide a link between...
Which application testing method tests applications from within using software instrumentation? 1 point SAST: Static Application...
Which application testing method tests applications from within using software instrumentation? 1 point SAST: Static Application Security Testing. IAST Interactive Application Security Testing. PAST: Passive Application Security Testing. DAST: Dynamic Security Application Testing. 57. Question 57 Which one of the OWASP Top 10 Application Security Risks would be occur when there are no safeguards against a user being allowed to execute HTML or JavaScript in the user's browser that can hijack sessions. 1 point Insufficient logging and monitoring Security misconfiguration...
Scenario Please read this scenario and job description carefully. You are involved in the prestigious but...
Scenario Please read this scenario and job description carefully. You are involved in the prestigious but often challenging Google recruitment process. As part of this process you are required to respond to several questions and activities. All your answers must address the context of this scenario and the information given in the individual questions . Job description - Software development professional at Google There's no such thing as “a normal day" at Google. We work to create and maintain the...
1) Which of the following is not a valid way that a CRM system can collect...
1) Which of the following is not a valid way that a CRM system can collect information? A. accounting system B. order fulfillment system C. inventory system D. customer’s personal computer 2)Which of the following is a common marketing CRM metric? A. number of new prospective customers B. average number of service calls per day C. average time to resolution D. cost per interaction by marketing campaign 3)Which question below represents a CRM reporting technology example? A. Why did sales...
QUESTION 1 The Matrix Indexing System consists of these activities: Merging information from three sources: (1)...
QUESTION 1 The Matrix Indexing System consists of these activities: Merging information from three sources: (1) an electronic bibliographic database, such as MEDLINE; (2) reference management software, such as RefWorks, EndNote, or ProCite; and (3) the Documents folder within your Lit Review master folder; expanding the Documents folder in your Lit Review master folder; and updating a review of the literature. True False QUESTION 2 If you set up your initial review of the literature using the Matrix Method, you...
Required information Chapter 17 Case: Reducing Ambiguity in Business Requirements The number one reason projects fail...
Required information Chapter 17 Case: Reducing Ambiguity in Business Requirements The number one reason projects fail is bad business requirements. Business requirements are considered “bad” because of ambiguity or insufficient involvement of end users during analysis and design.     A requirement is unambiguous if it has the same interpretation for all parties. Different interpretations by different participants will usually result in unmet expectations. Here is an example of an ambiguous requirement and an example of an unambiguous requirement: • Ambiguous requirement:...
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems....
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems. The first thing they did was implement the best practice if separation of domains. As a result of this The bank had to get a new domain name. any change made in the records points to only one party who could have made that change. If you are a technical person, you must have office in a particular area of the building. accessing outside...
65. Question 65 Which feature of this email is a red flag, indicating that it may...
65. Question 65 Which feature of this email is a red flag, indicating that it may be a phishing attack and not a legitimate account warning from PayPal? <<insert Paypal phishing email graphic>> 1 point Poor quality layout. Suspicious attachments. There is a hyperlink in the body of the email. Generic greetings and signature. 66. Question 66 Which three (3) of these are PCI-DSS requirements for any company handling, processing or transmitting credit card data? (Select 3) 1 point Assign...
Hi, please can you show me the correct answers to these questions? Thanks Question 16 1.    ...
Hi, please can you show me the correct answers to these questions? Thanks Question 16 1.     Which of the following best describes a linear presentation? 1. Linear presentations use a backchannel such as Twitter. 2. Linear presentations build the message point by point and end with a conclusion following logical steps. 3. Linear presentations are best developed with interactive slide software such as Prezi. 4. Linear presentations are given before a live audience with a question and answer opportunity. 5....
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT