1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
QveST [7]
2 years ago
10

System development life cycle

Computers and Technology
1 answer:
Taya2010 [7]2 years ago
6 0
The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application. SDLC can apply to technical and non-technical systems.
You might be interested in
Quick question;
insens350 [35]

A company could benefit from data mining finding valuables in said data. They could use it to earn bitcoin which can be cashed out. Also they can find hidden items unreleased in files.

hope this helps! :D

8 0
3 years ago
DRU is a small brokerage house that enables its clients to buy and sell stocks over the Internet, as well as place traditional o
guapka [62]

Answer:

(A) A SMTP is a guideline that allows a client to send a message to the server in a network.

The web based mail is a kind of interface by which a correspondence occurs by applying the web explicit conventions or standards fro most of the time.

(B)The pros of an SMTP based two tie client server architecture are that, it has a free platform and a simple set up, also a detailed conversation between a client and a server.

The cons involve, having a blocked SMTP ports, and the slow execution of mass mail.

For the Web based the pros are, no blockages are found, email responses are very quick.

It's cons are, it has a complex kind of arrangement.

(C)What is recommended in this case for DRU is to use the SMTP based two tier client server architecture because, it is quicker, faster, secure and easy to fix.

Explanation:

Solution

(A) A Simple Mail Transfer Protocol (SMTP) is a standard in a which a customer sends messages over to the server in a network.

The sending of emails determines the manner of communication between the server and customer or client. this starts of with a TCP association with a particular port. the customer sends out different snippets of data, and then the server needs to have to look for the verification and email.

A web based email is a kind of interface where the correspondence occurs by making use of web -explicit conventions, for most of the time, the  HTTP will allow you to integrate capacities from assistance coming from outside into your application.

(B) (i) SMTP based two tier client server architecture:

The pros or advantages:

It is platform free and has a simple set up

A complete conversation or communication between the server and the client.

The cons or disadvantages:

A blocked SMTP ports

For a mass email it has a slow execution or implementation

(ii) For the web based the pros and cons is stated below:

The pros:

No blockage is found

Quick email response or transfer or movement.

Cons or disadvantages:

It has a complex or difficult arrangement

Complexity of any type increases or goes higher.

(C) What i will recommend for DRU will be the SMTP based two tier client server architecture due to the following reasons shown below:

It is quicker

It is faster

It is more secure/security

It does not require any high skill to use it;s service

It is easy to fix.

5 0
3 years ago
Create a constructor that requires parameters for the job number and estimated hours only. Also, include a ToString() method tha
Elodia [21]

Answer:

See explaination

Explanation:

Job.cs

using System;

using System.Collections.Generic;

using System.Linq;

using System.Text;

using System.Threading.Tasks;

namespace JobApp

{

public class Job

{

private int jobNumber;

private int estimatedHours;

private double price;

public Job(int jobNum, int estHrs)

{

jobNumber = jobNum;

estimatedHours = estHrs;

CalculatePrice();

}

public int JobNumber { get; set; }

public int EstimatedHours

{

get { return estimatedHours; }

set { estimatedHours = value; CalculatePrice(); }

}

private void CalculatePrice()

{

price = estimatedHours * 45;

}

public virtual double getPrice()

{

return price;

}

public override string ToString()

{

return GetType() + "\n" +

"Job No: " + jobNumber + "\n" +

"Est. Hrs.: " + estimatedHours + "\n" +

"Price: $" + price;

}

}

}

RushJob.cs

using System;

using System.Collections.Generic;

using System.Linq;

using System.Text;

using System.Threading.Tasks;

namespace JobApp

{

public class RushJob : Job

{

private double additionalCharge;

public RushJob(int jobNum, int estHrs, double additionalCharge):base(jobNum, estHrs)

{

this.additionalCharge = additionalCharge;

}

public override double getPrice()

{

return this.additionalCharge + base.getPrice();

}

public override string ToString()

{

return

base.ToString() + "\n" +

"Additional Charge: $" + this.additionalCharge + "\n" +

"Total Price: $" + getPrice();

}

}

}

JobDemo.cs

using System;

using System.Collections.Generic;

using System.Linq;

using System.Text;

using System.Threading.Tasks;

namespace JobApp

{

class JobDemo

{

static void Main(string[] args)

{

Job job = new Job(101, 10);

Console.WriteLine(job.ToString());

Job rushJob = new RushJob(102, 15, 5);

Console.WriteLine("\n"+rushJob.ToString());

Console.ReadKey();

}

}

}

5 0
3 years ago
What is one potential problem associated with an organization purchasing new technology early in its lifecycle
Vlad [161]

is it multiple choice

Answer: if it imma repost the answer for you


Explain:



4 0
3 years ago
David would like to send mike a message using an asymmetric encryption algorithm. What key should he use to encrypt the message?
stiks02 [169]

Mike's public key is used. When encrypting a message utilizing an asymmetric encryption algorithm, the individual performing the encryption does so using the recipient's public key.

<h3>What is Encryption?</h3>

Encryption exists as a method of scrambling data so that only authorized parties can understand the information. In technical terms, it stands for the process of converting human-readable plaintext to incomprehensible text, also understood as ciphertext.

In cryptography, encryption exists as the process of encoding information. This process transforms the original representation of the information, understood as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original data.

Encryption improves the security of a message or file by scrambling the content. To encrypt a message, you require the right key, and you need the right key to decrypt it as well. It stands as the most effective way to hide communication through encoded information where the sender and the recipient hold the key to deciphering data.

Symmetric-key algorithms exist algorithms for cryptography that utilize the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to proceed between the two keys.

Hence,  Mike's public key is used. When encrypting a message utilizing an asymmetric encryption algorithm, the individual performing the encryption does so using the recipient's public key.

To learn more about Encryption refer to:

brainly.com/question/9979590

#SPJ4

3 0
2 years ago
Other questions:
  • Hi! I dont want to be billed and i have already cancelled my subscription, how can I get a refund for this?
    13·1 answer
  • UDP provides unreliable data transfer and therefore
    14·1 answer
  • Plz help me of this answer<br><br><br>language:python​
    7·2 answers
  • A user has created a complex spreadsheet on her workstation containing many graphs and charts. She sent the document to an older
    5·1 answer
  • What can i use to erase data off computer and what name of it and steps
    9·1 answer
  • 4.2 lesson practice helps plzs
    9·1 answer
  • Which is an example of artificial intelligence in computers? A. multimedia software B. encryption software C. voice recognition
    6·1 answer
  • Which sentence in the passage shows an effective way to protect your document from misuse? Claire has saved her research paper o
    14·1 answer
  • Think of a routine task (studying, exam preparation, downtime, grocery shopping, food preparation, etc.) in your life that you m
    7·1 answer
  • Why is computer called information processing machine ?????​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!