1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
3 years ago
6

In the software development life cycle, what is the role of participants in the planning phase? The participants’ role in the pl

anning phase involves working in conjunction with the members.
(help would be greatly appreciated :) )
Computers and Technology
1 answer:
SVEN [57.7K]3 years ago
5 0

The stages of the life cycle for software development (SDLC) need to be continuously entwined with planning in order to ensure the process works  smoothly, and efficiently to run in a productive way.   If these guidelines are not met, there will be complications that arise unexpectedly, causing many frustrations to the end user.

Before planning: Make sure that the current problems have been identified. Also, ask questions so you know exactly what the client wants.  This stage of SDLC means getting input from all stakeholders, including customers, salespeople, industry experts, and programmers.  Completely study the current software usage in order to learn the strengths and weaknesses of the current system.

Planning:  Once you know what is needed and what the client wants, the team can now define the requirements of the new software. This will also be where the team researches the costs and resources necessary to achieve the final product. The team will also look at details such as the risks involved and provides sub-plans for softening those risks. A Software Requirement Specification document will also be created by the team before moving forward.

The next steps will be to design, build, test and finally deply in a "go-live".

You might be interested in
Alejandra is using a flash drive that a friend gave to her to copy some financial records from the company database so she can c
Misha Larkins [42]

Answer:

maybe threat?

Explanation:

4 0
3 years ago
The L-exclusion problem is a variant of the starvation-free mutual exclusion problem. We make two changes: as many as L threads
vladimir2022 [97]

Answer:

The solution is as follows.

class LFilters implements Lock {

int[] lvl;

int[] vic;

public LFilters(int n, int l) {

lvl = new int[max(n-l+1,0)];

vic = new int[max(n-l+1,0)];

for (int i = 0; i < n-l+1; i++) {

lvl[i] = 0;

}

}

public void lock() {

int me = ThreadID.get();

for (int i = 1; i < n-l+1; i++) { // attempt level i

lvl[me] = i;

vic[i] = me;

// rotate while conflicts exist

int above = l+1;

while (above > l && vic[i] == me) {

above = 0;

for (int k = 0; k < n; k++) {

if (lvl[k] >= i) above++;

}

}

}

}

public void unlock() {

int me = ThreadID.get();

lvl[me] = 0;

}

}

Explanation:

The code is presented above in which the a class is formed which has two variables, lvl and vic. It performs the operation of lock as indicated above.

6 0
3 years ago
Select the statement that best describes the function of the cell wall. O it gives shape to plants cells. O it produces food fro
Maslowich
It’s jelly like fluid surrounds the nucleus
8 0
3 years ago
As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them.
Aliun [14]

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

  • This attack is aimed to avoid legal customers of one's website from accessing it.  
  • In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  
  • One other way to successfully attack is to send fake requests from the attacker.
5 0
3 years ago
In this lesson you wrote code to make the turtle draw squares. Briefly describe how the code for
ale4655 [162]

Explanation:

that programming language you must use?

3 0
3 years ago
Other questions:
  • Give two examples of desktop publishing software
    7·1 answer
  • The specifications for ____ are developed by the world wide web consortium (w3c) and are continually evolving.
    13·1 answer
  • Suppose that your application uses a loop that isn't producing the intended results. The best way to analyze what’s going on in
    13·1 answer
  • Interactive sites where users write about personal topic and comment to threaded discussion are called?
    10·2 answers
  • What do Business Analysis workers do? Check all that apply.
    15·2 answers
  • HELP ASAP !!! What should be a one-page document?
    7·1 answer
  • A list of sources used for in-text citations that appears at the end of a document is called:
    10·1 answer
  • Which panel is used to make a website​
    8·1 answer
  • What ethical concerns might arise from applying new IT to law enforcement?
    5·1 answer
  • Which option should Gina click to edit the text contained in a text box on a slide in her presentation?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!