1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
3 years ago
6

In the software development life cycle, what is the role of participants in the planning phase? The participants’ role in the pl

anning phase involves working in conjunction with the members.
(help would be greatly appreciated :) )
Computers and Technology
1 answer:
SVEN [57.7K]3 years ago
5 0

The stages of the life cycle for software development (SDLC) need to be continuously entwined with planning in order to ensure the process works  smoothly, and efficiently to run in a productive way.   If these guidelines are not met, there will be complications that arise unexpectedly, causing many frustrations to the end user.

Before planning: Make sure that the current problems have been identified. Also, ask questions so you know exactly what the client wants.  This stage of SDLC means getting input from all stakeholders, including customers, salespeople, industry experts, and programmers.  Completely study the current software usage in order to learn the strengths and weaknesses of the current system.

Planning:  Once you know what is needed and what the client wants, the team can now define the requirements of the new software. This will also be where the team researches the costs and resources necessary to achieve the final product. The team will also look at details such as the risks involved and provides sub-plans for softening those risks. A Software Requirement Specification document will also be created by the team before moving forward.

The next steps will be to design, build, test and finally deply in a "go-live".

You might be interested in
"the master boot record (mbr) method of partitioning hard drives is limited to what maximum size of drives
Vaselesa [24]
The answer is <span>2TB.  T</span>he master boot record (mbr) method of partitioning hard drives is limited to  2TB.  <span>The </span>Master Boot Record<span> (</span>MBR<span>) is the information in the first </span>sector<span> of any hard disk that identifies how and where an OS is located, so that it can be </span>boot<span> (loaded) into the computer's main storage or RAM.</span>
6 0
3 years ago
When you pass an array as an argument to a function, the function can modify the contents of the array?
taurus [48]
In most languages. Primitive data types ( char, int, float, bool, maybe string ) are usually passed by value, but compound data types are passed by reference, so you're not working on a copy but on the original.
8 0
3 years ago
What year did apple computer introduce the first ipod?.
Lady bird [3.3K]
Apple first released the first ipod in 2001
8 0
2 years ago
What is the most flexible way to modify a report?
Vesna [10]

Answer: Use the Design view

Explanation: Using a Design view to modify a report is the most flexible way to modify a report as opposed to a layout view which is another way to modify a report .  The design view  is flexible in the sense that it provides a more outlined structured view of your report that you can see the header and footer for the report. it also affords you the ability to control your  report in terms of changing many properties, adjusting images, labels  and editing  text box, etc.

8 0
3 years ago
Which of these might be an example of an advertisers target group
Eduardwww [97]
Where are the examples?

3 0
3 years ago
Other questions:
  • In the spreadsheet example shown in chapter 5 ____ run from top bottom and are designated by a letter?
    12·2 answers
  • What kind of printer is used with multipart forms such as those with point of sale machines?A) dot-matrixB) daisy-wheelC) inkjet
    5·1 answer
  • (BRAINLIEST QUESTION) What are some challenges that will need to be overcome in order for the Internet of Vehicles to become a r
    13·1 answer
  • The method for updating the main memory as soon as a word is removed from the cache is called
    10·1 answer
  • Violations of security policies are considered to be a(n) __________ issue upon which proper disciplinary actions must be taken.
    7·1 answer
  • How do you change the name on your brainly account?
    12·1 answer
  • Assume the availability of a function is_prime. Assume a variable n has been associated with positive integer. Write the stateme
    15·1 answer
  • how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks
    10·1 answer
  • Trojans depend on ________ to spread. A rootkits B self-replication C code injection D social engineering
    14·1 answer
  • My computer is being weird, Everytime I begin to type something on here it keeps adding a letter to the beginning of my sentence
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!