Under extreme programming, ________ and ________ are intimately related parts of the same process

Answers

Answer 1
The answer to this question is: coding and testing
Extreme programming is a software development methodology that aim to improve software quality by measuring whether the technology can be used to fulfill customer's requirement.
To actually get somethings that is accepted by the customers, various coding and testing the software will be done constantly
Answer 2
Coding and testing is the answer.

Related Questions

Sql statements that define the objects such as tables, indexes, triggers, etc. in a database are referred to as _______________ statements.

Answers

source statements i hope this helped

What motivates engineers to make tcp/ip packets more independent?

Answers

The TCP/IP model has four layers: application, host-to-host layer, internet layer and network access layer.  
TCP is the transmission protocol that is used and it is connection-oriented.
IP stands for Internet. 
A stream of bytes is broken into segments and reconnected at the other end. The packets are retransmitted whatever is lost and the segments are organized might in the correct order. 
The boom of new different applications that should be interoperable motivates engineers to make tcp/ip packets more independent.

What command would you issue from the command prompt to test whether your computer has connectivity to the network?

Answers

ping ${myDefaultRoutersAddress}

Personally, I'd probably run ifconfig to see my network setups. Then I'd need to run "netstat -rn" to get my default router's address.

In one or more complete sentences, explain about vehicle maintenance and vehicle safety

Answers

Vehicle maintenance is important because without them the vehicle would not function properly and could be a safety hazard. Vehicle safety is important because without it we could end up seriously injured or even killed, vehicles can be very dangerous if handled irresponsible and the proper safety methods are not used.

Vehicle maintenance and safety are essential parameters for road and traffic safety.  If vehicle is not working proper then it may cause serious damages like accident or may be death.

Further explanation:

Vehicle maintenance: This is very important to feel confident that your vehicle will function properly on the road. The easiest way to save the investment is through preventive maintenance. In preventive maintenance, keeping record is the main feature. This will include inspection, lubrication and repairing records. Everyone must know the mechanical condition of their vehicle. Before going for any trip, one should check the engine condition whether it is working properly or not. For this, start the engine and check that every instrument is giving normal reading or not. If it is not giving the normal readings then go to the service center and ask the mechanic to check the condition of the vehicle. Also, you must check the emergency equipment like fire extinguisher is charged or not and spare tire/wheel is okay or not.

Vehicle Safety:  For vehicle safety, follow the below safety guidelines:

Wear your seat belt or helmet in case you are riding bike.Make sure your vehicle is working fineDon’t speed or drive more than the speed limit.Don’t drive imperfective.Use car seats for childrenDon’t drink and driveFollow traffic rules

Learn more:

1. How does coding work on computers?  brainly.com/question/2257971  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832

Answer details:

Grade: Middle School

Subject: Environmental Study

Chapter: Road Safety Measures

Keyword:

Vehicle, maintenance, safety, road, condition, traffic rules, seat belt, speed limit, ride, bike, car, engine, fuel, lubricants, repair, inspection, mechanic

Which is not a tool hackers use to gain access to and take control of your computer?

Answers

A rat/ or kalilinux is used to take over your computer but Kalilinux is a linux program most hackers use it to do all types of stuff with it if not to use kali the other software is a rat witch can take control of your whole computer and a rat is a virus witch is hard to get away from 

Using Word, Maureen is writing an outline of a presentation she plans to give to her company. She will be showing a video during the presentation, and she would like to place images of isolated video frames in her outline so that she remembers exactly what to talk about when the corresponding part of the video is played to her audience. Which tool would be best for Maureen to place these images in Word, and why?

Answers

A copy and paste would be fastest and easiest. As you can pinpoint the exact location to where you want the picture to be. 

Answer:

The tool that would be best for Maureen to place the image in Word is the Screen Clipping tool because it allows to pick a window that is opened in the device and insert the screenshot of it in the document.

Explanation:

The screen clipping tool allows you to take a screenshot of a window that is opened in the device and add it to the document in which you are working.

To use it you have to click on the part of the document where you want to put the image and click on the insert tab and then, screenshot. After this, you will see the windows that are opened and you can choose the screenshot you need or select a part of it. Then, the image is added to the document. According to this, the tool that would be best for Maureen to place the imagen in Word is the screen clipping tool.

What does limited access to a document mean?

It makes a document inaccessible without a password.
It enables a person to make changes and automatically save them.
It does not reflect any changes made in the document.
It enables a person to read the document but not edit it.
It blocks a person from accessing a document.

Answers

the second last one is the answer i think

Answer:

C). It enables a person to read the document but not edit it.

Explanation:

Limited access to a document is primarily associated with the creator of document restricting the usage and changes that can be made to a specific document. It assists the users to protect the authenticity of their document and prevent it from any unnecessary editing to the document. Therefore, the limited access to a document would imply 'enabling a person to only read the document but not edit or make changes to it' without the creator's permission. It is thus aimed to limit the access to a specific content. Therefore, option C is the correct answer.  

Which component, located on the motherboard, carries out all the instructions provided by computer programs? ram?

Answers

The Chipset is the component located on the motherboard, this carries out all the instructions provided by computer programs. It is the integrated circuit that manages all the data flow between processor and memory. It usually works with microprocessors and plays a crucial role in determining system performance.

The area that holds all the instructions the computer needs to start up when it is powered on is ________. the cpu rom ram the usb

Answers

ROM (Read Only Memory)

Assuming you are using the sun sdk, what command would you type at the operating system command prompt to compile the program labassignment.java?

Answers

Assuming javac is on the PATH variable:

javac labassignment.java

Otherwise, it would have to be:

/path/to/javac labassignment.java

Which of the following choices is not an operating system? A. DOS B. UNIX C. Windows 97 D. Windows Vista

Answers

It should be A. DOS because all of the others are operating systems.
A. Cuz all the other ones are known world wide

________ allows visitors to add, remove, or edit its content.

Answers

That would be Wiki.......

You are logged in as a user with limited system privileges, you are the linux system administrator and you have the password to the root user account. when you need to switch to root user to perform administrative tasks, what command would you enter at the command prompt?

Answers

I use "su -" on my box. Red Hat wanted "sudo -i" in the RHCSA and RHCE courses.

When reassembling your pc what does the text recommend as the first step?

Answers

When reassembling your PC the first step is to wear an anti shock bracelet to ground yourself from the electricity. Then take a Philips head screwdriver and take the machine apart. Typically the hard drive is taken out first and then the RAM.

Which option enables you to keep the last grammatical change

Answers

To keep last grammatical change in a word processor, one should look for the "Undo" or "Ctrl+Z" option.

How do we use it in word processor?

In most word processors like Goo/gle Docs, we can simply press "Ctrl+Z" or select the "Undo" option from the menu to revert the last grammatical change you made. This feature allows to quickly correct any mistakes or undo changes that you may have made unintentionally.

Its helps for maintaining the correctness and clarity of your documents. So, if we want to preserve the last grammatical we will use the "Undo" function in the word processing software.

Read more about grammatical change

brainly.com/question/33472332

#SPJ1

Each hard disk is divided into pie-shaped groups of ____.

Answers

sectors







-------------------------------

To reboot a pc, hold down the ____ keys at the same time.

Answers

CTRL+ALT+DELETE

Sometimes called a three finger salute.

alt f4

Explanation:

alt f4 is the goatttttttttttttttttttttttttttttttttttttttttttttttttttt

The name of an array stores the ________ of the first array element

Answers

address. The equivelent of array[ 0 ].

What is the purpose of using modulo 2 arithmetic rather than binary arithmetic in computing an fcs?

Answers

Final answer:

The purpose of using modulo 2 arithmetic in computing an FCS is to detect transmission errors through simple and efficient calculations. It provides a checksum that can be used to verify data integrity, detecting common errors like single-bit and burst errors. This method does not require handling carry operations, simplifying implementation.

Explanation:

The purpose of using modulo 2 arithmetic in computing a Frame Check Sequence (FCS) is to provide error detection capability when data packets are transmitted over a network. Modulo 2 arithmetic is a simple, efficient method of calculating a type of checksum that can be used to verify the integrity of the transmitted data. By performing bitwise exclusive OR (XOR) operations on the data bits, modulo 2 arithmetic generates a value that can be appended to the data. When the data is received, the same operations are performed, including the FCS. If the result is zero, it is assumed that the data has not been corrupted during transmission.Modulo 2 arithmetic is used because it resembles binary addition without carry. It simplifies the hardware or software implementation since handling carry operations is not required. Also, modulo 2 arithmetic can detect common errors such as single-bit errors and burst errors that can occur in communication channels, providing a simple yet robust way to ensure data integrity. This method is commonly used in network protocols, for example, in the Cyclic Redundancy Check (CRC).

What is a program that, when installed on a computer, records every keystroke and mouse click?

Answers

"Key logger" This could be software or hardware that does this.

Which of the following definitions describes a receptacle ground fault circuit interrupter (GFCI)? A. Includes an extension cord B. Protects a worker by increasing the duration of an electrical shock C. Protects users from ground faults when someone connects electrical equipment to a GFCI protected outlet D. Replaces a circuit breaker on the main circuit board Suspend Assessment

Answers

C. Protects users from ground faults when someone connects electrical equipment to a GFCI protected outlet

In linear programming a solution that does not simultaneously satisfy all constraints is called an

Answers

When it comes to linear programming, the solution which would be effective in satisfying all constraints in the given program in a simultaneous matter is called that of feasible programming. This is due to the fact that the program can satisfy all requirements at the same time.

Suppose we are comparing implementations of insertion sort and merge sort on the same machine. for inputs of size n, insertion sort runs in 8ð2 steps, while merge sort runs in 64ð log2 ð steps. for which values of ndoes insertion sort beat merge sort?

Answers

well i think u should give up on school and just  smoke some green fam.

What are the two main components on the motherboard?

Answers

A chipset which forms an interface between the CPU's front-side bus, main memory, and peripheral buses. Non-volatile memory chips (usually Flash ROM in modern motherboards) containing the system's firmware or BIOS. A clock generator which produces the system clock signal to synchronize the various components.
The processor(CPU) and the memory

PLZ HELP ASAP!!!
The CPU is referred to as the ______ of the computer.

A. brains
B. face
C. heart
D. soul

Answers

the CPU would be the brain so A) 


have a wonderful rest of ur day :)

Why is it important to back up data on a computer before you burn-in test the cpu?

Answers

A burn-in test is a test which is usually performed on a system or component by running it for a long time in order to bring out any errors or system failures etc. 
While doing it on CPU the data must be backed up as any kind of error or failure may result in the loss of data, at time systems can be repaired to retrieve data but still there is no guarantee, backing up is the best option.

List several things that geographers can map using remotely sensed data

Answers

Remote sensing refers to the process of taking earth's measurements using sensors from the satellites or airplanes. The sensors collect information in image form, these images are then analysed to obtain necessary information.
Geographers can map a lot of things using remotely sensed data, these things include: any location on the earth surface, vegetation distribution, water bodies distribution, etc.

The main reason to use a visual aid in a presentation is to

a ensure concepts are more challenging to understand.
b make a challenging concept easier to understand.
c guarantee that complex information is accurate.
d keep an audience’s attention through distraction.

Answers

D keep the audiences attention through distraction

Answer:

d keep an audience’s attention through distraction.

Explanation:

Advantages of Visual Aids in a Presentation:

A picture is worth a thousand words - presentation softwares let you display images and videos that help prove the speaker's theses. By using graphics to show trends or using photographs to showcase a product, the speaker helps the audience better visualize (and therefore understand) what he or she tells you.Appeals to many senses - While oral speech mainly stimulates hearing, the use of multimedia tools stimulates other senses, especially vision. To see is to feel. And for some auditoriums that makes all the difference: Have you ever wondered why tradeshow vendors insist on permanently repeating demonstrations without forgetting the videos that explain the benefits of their products?Greener and more versatile support - Multimedia presentations save paper: a single presentation can be seen by all members of the auditorium without photocopying. On the other hand, they allow greater creativity and originality in the presentation of contents when compared to paper.Easy content creation - Multimedia tools allow you to quickly and simply dress up and embellish the speaker's ideas and make them visually appealing. In fact, no Visual Design course is required to make captivating slides.

Which of the following statements best describes O*NET OnLine?

Answers

The correct option that best describes O*NET OnLine is:

A) O*NET OnLine is a comprehensive database of occupational information, providing details on hundreds of standardized and occupation-specific descriptors.

O*NET OnLine serves as a valuable resource for individuals exploring career options or seeking detailed information about various occupations. It offers a wide range of standardized and occupation-specific descriptors, including job tasks, skills required, education levels, salary ranges, and job outlooks.

This database helps users make informed decisions about their careers by providing detailed insights into different professions and their requirements.

O*NET OnLine is a reliable online platform that offers a wealth of occupational information, making it a go-to source for career exploration, job analysis, and decision-making processes.

The probable question may be:

Which of the following statements best describes O*NET OnLine?

A) O*NET OnLine is a comprehensive database of occupational information, providing details on hundreds of standardized and occupation-specific descriptors.

B) O*NET OnLine is a social networking platform for professionals in various industries to connect and share career-related insights.

C) O*NET OnLine is an online marketplace for job seekers and employers to match job openings with candidate qualifications.

D) O*NET OnLine is a virtual reality platform offering immersive career exploration experiences for students and professionals.

âthe first line in a hypertext markup language (html) file is the _____, which is a processing instruction indicating the markup language used in a document.

Answers



This is usually not needed anymore in the updated versions of HTML 5.

Answer:

The first line in a hypertext markup language (html) file is the Doctype, which is a processing instruction indicating the markup language used in a document.

The correct answer is:

Doctype

Explanation:

The Doctype is the abbreviation for document type declaration which is an instruction related to XML and SGML documents that makes them adopt a document type definition to be shown as an element compatible in that format. In other words, it allows them to be from one type and be translated into another type without visual or presentation modification. It is just to be more flexible, fast, and manipulable.

Other Questions
which is the most likely response of a human to an increase in temperature?A.increasing the amount of perspirationB.increasing waste elimination from the bladderC.a reduction of desire for liquidsD.a contraction in blood vessels in the skin Discuss the backgrounds of the writers of the constitution, and explain why these men tended to be rather mistrustful of the notion of democracy When does the proportion form of newton's second law take the form of an equation? Explain how lol has evolved over the years Which is the BEST description of the difference between a republic and a direct democracy? A)There is no difference between these two types of governments, since they both rely on elected officials to create, enforce, and interpret laws. B)A republic is a system of government in which citizens vote on every issue, while in a democracy political power is held by elected representatives. C)A republic is a representative form of government, and a democracy is a government that is ruled according to the will of the majority. D)A democracy is a system of government in which power is held by a small number of people based on royalty or wealth, while a republic is a government in which supreme power is concentrated in the hands of one person. the map shows the route for a race. you are at a, which is 6000 feet from the first checkpoint b. the second checkpoint c is located at the midpoint between b and the end of the race d. the total race is 3 miles. how far apart are the 2 checkpoints? (hint: there are 5280 feet in a mile.) 5280 feet 6000 feet 4920 feet 9840 feet i will draw the picture! sphere do you think is the most important to study and why your answer should include information about all four spheres (hydrosphere lithosphere atmosphere and biosphere) Before buying a house, Dean and Donna Testa hired Ground Systems, Inc. (GSI), to inspect and describe the sewage and water disposal system. GSI reported that a split sewage and water disposal system was in place with a watertight septic tank, a wastewater tank, a distribution box, and a leach field. The Testas bought the house. Later, Dean Testa noticed that the system was not as GSI described; there was no distribution box or leach field. Furthermore, there was only one tank and the tank was not watertight. The Testas arranged for the installation of a new system and sold the house. Assuming that GSI is liable for a breach of contract, what is the measure of damages? The lowest possible frequency that can form in a musical instrument is called the _____. fundamental frequency the harmonic the second harmonic the last harmonic Senator McCarthys influence might have died quickly following his 1950 accusations had it not been for In the play Everyman, what is common to Discretion, Strength, Five Wits, and Beauty?A. They prove to be Everymans best friend.B. They all forsake him on his final journey.C. They are directed by God to forsake Everyman.D. They all perish on a difficult journey. how do you find the smallest positive integer k such that 1350k is a perfect cube? 20 POINTS How did American Indians react to white settlers in the Northwest Territory? They negotiated with the settlers. They moved out as settlers moved in. They attacked settlements in retaliation. They fought with other American Indian groups. Which concept does Buddhism share with Hinduism? the Four Noble Truths the Eightfold Path karma the Middle Path A. Given the equation 2(3x 4) = 5x + 6, solve for the variable The atomic particles responsible for forming bonds with other atoms are what is the answer to 2h x 3u A new wonder diet that results in a dramatic weight loss sweeps through america. the key to the diet is to eat unlimited amounts of red meat (beef) but no poultry or carbohydrate-rich foods. as millions of americans switch to the new diet, one would expect to see: which of the following is not congressional powerA.coining moneyB.commanding the armed forcesC.overriding a presidential vetoD.making laws Can you square root both sides of inequality Steam Workshop Downloader