1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zielflug [23.3K]
1 year ago
15

Which of the following is NOT a method for applying the SDLC model?

Computers and Technology
1 answer:
serg [7]1 year ago
5 0

Answer:

IPO is not a mehod for applying the SDLC .

You might be interested in
What the repeal of online privacy protections means for you?
kvv77 [185]
Online Privacy is well, our privacy while on the internet. If they have repealed that, then we have no privacy while on the internet. I feel like now a days there is no privacy at all anywhere. Everywhere you go, there are cameras watching you. So for them to take away online privacy is pretty messed up.
7 0
3 years ago
You want to create a directory called ~/Documents/papers, but you’re not sure that the ~/Documents directory exists. What comman
SCORPION-xisa [38]

Answer: e) mkdir -p ~/Documents/papers

Explanation:

As the question says we want to create a directory called ~/Documents/papers, but we are not sure whether it exist or not so we would type the command for making directory starting with mkdir.

Here mkdir means make directory. Followed by mkdir we will use -p. Here p is used to create all the directories for getting us the directory we want and its advantage is that it would ignore all the errors if the directory already exist.

Followed by the name of the directory that we want to create.

So the desired answer for the given condition would be mkdir -p ~/Documents/papers

5 0
3 years ago
true or false? in a known-plaintext attack (kpa), the cryptanalyst hs access only to a segment of encrpted data and has no choic
bulgar [2K]

Yes , it’s true. In a known-plaintext attack (kpa), the cryptanalyst can only view a small portion of encrypted data, and he or she has no control over what that data might be.

The attacker also has access to one or more pairs of plaintext/ciphertext in a Known Plaintext Attack (KPA). Specifically, consider the scenario where key and plaintext were used to derive the ciphertext (either of which the attacker is trying to find). The attacker is also aware of what are the locations of the output from key encrypting. That is, the assailant is aware of a pair. They might be familiar with further pairings (obtained with the same key).

A straightforward illustration would be if the unencrypted messages had a set expiration date after which they would become publicly available. such as the location of a planned public event. The coordinates are encrypted and kept secret prior to the event. But when the incident occurs, the attacker has discovered the value of the coordinates /plaintext while the coordinates were decrypted (without knowing the key).

In general, a cipher is easier to break the more plaintext/ciphertext pairs that are known.

To learn more about Plaintext Attack click here:

brainly.com/question/28445346

#SPJ4

6 0
1 year ago
Tower of Hanoi algorithm 4 disks
Sophie [7]
????is this a question
4 0
3 years ago
Read 2 more answers
PLEASE HELP ME !!! THIS IS DUE TODAY AND IM STUCK ON IT!!! Pls❤️✨❤️
Georgia [21]
What do you need help with?
4 0
3 years ago
Other questions:
  • What is a flash player?
    9·2 answers
  • The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
    7·1 answer
  • A(n) __________ DHCPv6 server relies on router advertisements to give some information to individual hosts, making small changes
    8·1 answer
  • Cassie is worried about credential management on a network where users often have over six passwords to remember. She’s curren
    13·1 answer
  • What are the differences between tkinter toolkit and PyQt?
    14·1 answer
  • 1
    13·1 answer
  • 6. Python indexes lists beginning with the number 1.<br> True<br><br> False
    15·1 answer
  • Ryo currently earns a monthly salary of $2200. She has been offered a raise of $250 per month. How much more will she earn per y
    14·1 answer
  • What are your considerations in making a derivative ict content ti effectively communicate or present data or information?
    11·1 answer
  • Which common online presentation medium do people use to present their own articles?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!