1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hunter-Best [27]
3 years ago
5

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system.

_________________________ Question 42 options:
Computers and Technology
1 answer:
navik [9.2K]3 years ago
6 0

Answer:

False

Explanation:

The Security Development Life Cycle (SDLC), is a software development which involves traditional approach towards its design such as, waterfall model, Agile, etc.

It can either be referred to as a generic secure development life cycle or a specific one, such as the Microsoft SDL or the Cisco SDL.

Its phases includes,

A1 - Security Assessment

A2 - Architecture

A3 - Design and Development 1

A4 - Design and Development 2

A5 - Ship

PRSA - Post Release

Each phase talks about how a secured software is developed.

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. This statement is false because by definition and attributes Security Development Life Cycle is a traditional approach towards software development and not a general method.

You might be interested in
If Number = 7, what will be displayed after code corresponding to the following pseudocode is run? (In the answer options, new l
kherson [118]

Answer:

5,10; 6,12; 7,14

Explanation:

We will demonstrate the iteration of the loop:

First iteration: Number = 7, Count = 5 at the beginning. We will check if Count <= Number? Since it is correct, prints 5,10. Increment the Count by 1.

Second iteration: Number = 7, Count = 6. We will check if Count <= Number? Since it is correct, prints 6,12. Increment the Count by 1.

Third iteration: Number = 7, Count = 7. We will check if Count <= Number? Since it is correct, prints 7,14. Increment the Count by 1.

Forth iteration: Number = 7, Count = 8. We will check if Count <= Number? Since it is not correct, the loop stops.

8 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
Tom [10]

Answer:

navigate keys

Explanation:

the up and down keys are to scroll through documents and pages.

8 0
4 years ago
Read 2 more answers
g Fill the validateForm function to check that the phone number is 10 characters long and that the user name is less than 11 cha
Rom4ik [11]

Answer:

function validateForm(event)

{

event.preventDefault();

var phoneNumber = form.phoneNumber.value;

var userName = form.userName.value;

if(phoneNumber.length!=10)

console.log("Phone Number is Invalid");

if(userName.length<11)

console.log("User Name is Invalid"); }

8 0
3 years ago
What are the advantages of customer relationship managment​
Delvig [45]

Answer:

Enhances Better Customer Service.

Facilitates discovery of new customers.

Increases customer revenues.

Helps the sales team in closing deals faster.

Enhances effective cross and up-selling of products.

Simplifies the sales and marketing processes.

Makes call centers more efficient.

Enhances customer loyalty.

3 0
3 years ago
Add the following line of code to the end of your script, replacing any function calls: nested_sum( eval(input()) )
masha68 [24]

The program is an illustration of loops; Loops are program statements used for repetition of operations

<h3>How to complete the code?</h3>

The complete question is added as an attachment

The code written in Python that completes the missing parameters in the question are:

def nested_sum(mylist):

   total = 0

   for other_list in mylist:

       total += sum(other_list)        

   print(total)

   

t = [[1,2],[3],[4,5,6]]

nested_sum(t)

nested_sum( eval(input()))

Read more about loops at:

brainly.com/question/24833629

#SPJ11

8 0
2 years ago
Other questions:
  • B. Find Addition of Binary Numbers: 1100112 + 11012
    11·1 answer
  • What argument for "the seen" suggested that breaking windows is a good thing?
    11·1 answer
  • When a member function is defined outside of the class declaration, the function name must be qualified with theWhen a member fu
    14·1 answer
  • (10 points) A stopwatch has three states named Zero, Running, and Stopped. There are two buttons, named B1 and B2. For each butt
    13·1 answer
  • A computer is an electronic device, operating under the control of instructions stored in its own _______________, that can acce
    7·1 answer
  • If my usb could unlock my computer with a tool then could i be able to open it using ip unlock
    9·1 answer
  • What are the main features cyber law of Nepal​
    13·1 answer
  • Discuss how the Internet has made our communication hypertextual, omnidirectional, and more interactive
    6·1 answer
  • Whats the answer :)?<br>i will give brainslist​
    11·1 answer
  • Help me guys plssssss​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!