1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MakcuM [25]
3 years ago
8

Frank is preparing a subsection of the SRS document that specifies data formats, data integrity, and storage capabilities. Which

subsection is Frank preparing?
A. External Interface Requirements
B. Design Constraints
C. Inverse Requirements
D. Logical Database Requirements
E. Non-Functional Requirements
Computers and Technology
1 answer:
Flauer [41]3 years ago
4 0

The subsection which Frank is preparing for the SRS document that specifies data formats, data integrity, and storage capabilities is Logical Database Requirements.

<h3>What is SRS document?</h3>

SRS document of the software requirement specification document is the document which describes the function of a software and its procedure to perform a particular function.

Different types of requirement-

  • A. External Interface Requirements- This includes the interface of used, such as layout of screen, button etc.
  • B. Design Constraints- This includes the subcomponent of the system, such as performance requirement.
  • C. Inverse Requirements- It defines that what a system can not do.
  • D. Logical Database Requirements- Data of the user are saved in this such as profile, massage,data formats, data integrity, and storage capabilities etc.
  • E. Non-Functional Requirements-This includes attributes of system, performance, security etc.

Frank is preparing a subsection of the SRS document that specifies data formats, data integrity, and storage capabilities.

Thus, the subsection which Frank is preparing for the SRS document that specifies data formats, data integrity, and storage capabilities is Logical Database Requirements.

Learn more about the SRS document here:

brainly.com/question/26161636

#SPJ1

You might be interested in
Information technology has powerful effects on social behavior. Which of the following issues should NOT be expected when intera
AfilCa [17]

Increased inhibitions and a decreased likelihood that all members will contribute to the discussion is the following issues should NOT be expected when interacting with teammates via information technology

b. Increased inhibitions and a decreased likelihood that all members will contribute to the discussion.

<u>Explanation:</u>

In information technology, social behaviour will effect more powerful in industries. In digital medial those use mobile everybody is a media person, easily share the important to social media and sharing person doesn’t aware of the effect of sharing the information.

If a piece of information is received or send both the sender and receiver should be aware of the importance of information make sure it should not be shared outside the group members or the world.

Once import information shared outside the world it can stop any given point time.

6 0
3 years ago
7. Define ports including standard and<br>specialized ports. Give examples of each.​
Montano1993 [528]

Answer:

An example of a standard port is USB (universal serial bus) which connects several devices to the system unit. An example of a specialized port is Thunderbolt which is identified by Apple's MacBook Pro and provides a high-speed connection promising to replace a number of ports such as Mini Display port.

Explanation:

Please give brainlest

5 0
3 years ago
If i paid $37.20 for 12 gallons of ice cream how many would 1 quart of ice cream cost
Lapatulllka [165]

Answer:

$0.78

Explanation:

5 0
3 years ago
Read 2 more answers
John, an ethical hacker, is demonstrating a proof-of-concept IoT attack. For this demonstration, he used a jammer to jam and sni
scoundrel [369]

Answer:

BlueBorne Attack

Explanation:

If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.

Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication

Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.

4 0
3 years ago
If a user has one column in a table and would like to make it into two columns, which command should be used?
Vesna [10]
Split cells.

This answer needs to be twenty characters long to qualify so here is this useless sentence.
4 0
4 years ago
Other questions:
  • Which connector is most commonly used to connect printers to desktop pc systems?
    10·1 answer
  • How do air and ocean currents affect climate
    5·2 answers
  • Which entity might hire a computer systems analyst to help catch criminals?
    14·2 answers
  • What happens when you get 3 warnings on this site?
    9·2 answers
  • How would you use Microsoft Excel to
    10·2 answers
  • LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be
    9·1 answer
  • Select the correct term to complete the sentence.
    7·1 answer
  • State the advantages of MS Excel in data encoding
    9·1 answer
  • Can anyone fix this code for me?
    8·1 answer
  • What are the two different types of dns requests?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!