1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gladu [14]
1 year ago
15

During the maintenance phase of the sdlc, the team must _____ if a system's objectives are not being met

Computers and Technology
1 answer:
Darya [45]1 year ago
8 0

During the maintenance phase of the sdlc, the team must take the correct action if a system's objectives are not being met

<h3>What are the 5 phases of the traditional SDLC Software Development process)?</h3>

Software process is the set of activities that constitute the development of a computer system. These activities are grouped into phases, such as: requirements definition, analysis, design, development, testing and deployment.

The main focus of this phase of the SDLC is to ensure that the needs continue to be met and that the system continues to function as per the specification mentioned in the first phase.

See more about SDLC at brainly.com/question/14096725

#SPJ1

You might be interested in
Two threads try to acquire the same resource at the same time and both are blocked. Then, they continually change their states i
maksim [4K]

Answer:

livelock.

Explanation:

"Two threads try to acquire the same resource at the same time and both are blocked. Then, they continually change their states in the same way and are continuously blocked. This condition is called" LIVELOCK.

The term ''livelock" in is a very good and a very important in aspect that is related to computing. LIVELOCK simply means a lock in which the process in denied multiple times. A perfect example is;

When a person A and a person meet on a very narrow path. Both person A and Person B will want to shift to a position which will allow each of them to pass(This are the processes Person A and B wants to take), so if the two now move to the same exact position instead of moving in an opposite direction then, we will say that we have a LIVELOCK.

7 0
3 years ago
What would be the results of the following code? final int SIZE = 25; int[] array1 = new int[SIZE]; … // Code that will put valu
xz_007 [3.2K]
The code is first declaring array1 as a new array of integers with length 25. Then the comment tells us that somewhere in the middle of the code, values are given to each element of array1.

Lastly, we are iterating through the array using a for loop. We start at index 0, and continue until the index value (a) is one less than the length of the array. So array1[a] will give us the value that was assigned to the element at index a.

In the for loop, we are adding the value of array[a] to the integer "value" which was initialized as 0. Therefore, the result will be the sum of all the integers in array1.
7 0
3 years ago
"Create a Python program named detect_column_level_data_entry_errors. When complete, you will run this program to produce a diag
11111nata11111 [884]

Answer:

See explaination

Explanation:

Code for detect_column_level_data_entry_errors.py:

# File: detect_column_level_data_entry_errors.py

# The program will produce a diagnostic report that shows data entry errors that cause column

# totals in the data to be out of balance. Will need to fix cleaned_data.txt until errors resolved.

def main():

input_filename = input('Please enter the input filename: ')

infile = open(input_filename, 'r', encoding='utf8')

total_males = 0

total_females = 0

sum_total = 0

print('\n{0:^40}'.format('Column-Level Data Entry Errors'))

print('\n{0:<10}{1:>10}{2:>10}{3:>10}'.format(

'Age Group', 'Males', 'Females', 'Total'))

for line in infile:

age_group, males, females, total = line.split()

males = int(males)

females = int(females)

total = int(total)

print('{0:<10}{1:>10,}{2:>10,}{3:>10,}'.format(

age_group, males, females, total))

if age_group != 'Total':

total_males = males + total_males

total_females = females + total_females

sum_total = total + sum_total

else:

print('{0:<10}{1:>10,}{2:>10,}{3:>10,}'.format(

'Error', (males-total_males), (females-total_females), (total-sum_total)))

infile.close()

main()

8 0
3 years ago
For a web application we associate a web server, for a mobile application we associate a mobile server. for a decentralized appl
Alex_Xolod [135]

For a decentralized software application we associate a blockchain server.

<h3>What is a server?</h3>

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

<h3>Types of server.</h3>

In Computer technology, there are different types of server and these include the following:

  • Web server
  • Email server
  • File server
  • Database server
  • Proxy server
  • Distributed communication server
  • Centralized Server
  • Distributed application server
  • Blockchain server

Generally, a web software application is associated with a web server, a mobile software application is associated with a mobile server, and a decentralized software application we associate a blockchain server.

Read more on web server here: brainly.com/question/27960093

#SPJ1

7 0
1 year ago
Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the
ira [324]
  • The subnet mask would be a 32-bit integer which is formed by assigning the host bits to all 0's and the networking bits to so many 1's.
  • In this method, the subnetting separates the IP address between host and network addresses.
  • The subnet mask covers an IP address with its 32-bit number, thus the term "mask".

Given:

Network IP address \bold{= 172.149.254.0 /24}

Subnet numbers \bold{= 13}

Calculating the borrow bits:

\to  \bold{= ceil(\log_{2} 13) = 4 \ bits}

a)

Calculating the dotted decimal value for the subnet mask:

\to \bold{11111111.11111111.11111111.00000000}\\\\\to \bold{255.255.255.240}\\\\

b)

The additional bits which will be needed to mask the subnet mask that is = 4.

Learn more: brainly.com/question/2254014

4 0
3 years ago
Other questions:
  • True or false?
    13·1 answer
  • Should the existing system be replaced?This is a question that is asked during the _____ stage of the Systems Development Life C
    8·1 answer
  • You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You ch
    13·1 answer
  • Dennis would like to include a video in a presentation. The source of the video is on the internet, but he would like to ensure
    10·2 answers
  • 24 POINTS!!! <br> Why are Sequences, Selection, and Iteration building blocks of algorithms?
    5·1 answer
  • Extended essay on globalization not less than 200​
    6·1 answer
  • What stipulates that the source code of any software published under its license must be freely available.
    14·1 answer
  • Discuss new concepts that you have learned about Cisco Devices and how they will be helpful in the workplace.
    11·1 answer
  • What do we call the software which programmers use to program?​
    6·1 answer
  • Is a device used to test the network connection.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!