1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vitek1552 [10]
3 years ago
13

Difference between system and software development life cycle

Computers and Technology
1 answer:
umka2103 [35]3 years ago
3 0

Answer:

Software development life cycle is about building a software (“only”) in a phased approach systematically.

System development life cycle is about implementing hardware and software in a phased manner systematically.

Explanation:

Here both the hardware and the software is considered as a system.

Hope this helps!

You might be interested in
Jane receives an email claiming that her bank account information has been lost and that she needs to click a link to update the
marshall27 [118]

Answer:

C. Phishing

Explanation:

There are various terms under digital attack, some of them are :

Whaling: whaling is one of the categories of phishing whose mainly targeted persons are mostly high ranked professionals.phishing search data for the hacking purpose.

Vishing: vishing is mainly termed for voice phishing. when a person calls any other person by using the name of some reputed company to get another person's personal data is known as vishing.  

Phishing: when a person uses digital communication channel i.e. emails, by using the name of some reputed company to get another person's personal data is known as phishing.

Piggybacking: when a person gets access to another person's system or telephone by the illegal way is termed as piggybacking.

so, according to the scenario most appropriate answer is option C

3 0
3 years ago
PLEASE HELP ME ASAP!!!!
DanielleElmas [232]
1. Cellphones give "rewards" in the form of notifications that alert the user to a waiting surprise. This releases dopamine; a molecule that our body produces naturally. The presence of dopamine signifies lust, love, infidelity, motivation, attention, femininity, learning, and addiction. The mind & body begin to unconsciously (because dopamine is naturally occurring) crave that "high" one gets from, let's say, getting a large number of reactions to an Instagram post. As a result, the user posts more to get more reactions. They spend less & less time engaging with those around them. They are often irritated or anxiety ridden.

2. Alone time is EXTREMELY important & often difficult to get. One needs time to decompress, refresh & problem solve. This becomes an impossible task when one's senses are being constantly bombarded by ringtones & alerts.

3. Using electronic devices to frighten or harass. Ex- sending threatening emails.

4. Using electronic devices to bully someone with intimidating or hurtful comments and/or pictures.

5. Creating a fake social media or dating profile with the intention of deceiving people.

6. Electronically written code capable of stealing & destroying data.

7. Stealing & using someone's personal information for the purpose of financial/material gain.

8. Theft committed using a credit/debit card. It usually happens with online shopping.

9. The act of "breaking in" to an electronic device without authorization.

10. Acquiring money under false pretenses.
5 0
3 years ago
A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv
mel-nik [20]

Answer: True

Explanation:

Digital forensic analysts are the people who examine digital devices such as cameras, mobile phones and computers in order to get evidence of crime.

The evidence gotten by them can then be used to provide support to criminal investigations and can also be given to the intelligence agencies. Their function is to get back and safeguard the digital data which are related to cybercrime investigations as well as criminal investigations.

6 0
3 years ago
What is information associated with a document to help describe that document called?
noname [10]
You'd call that 'metadata'.
3 0
3 years ago
Beth would like to run an nmap scan against all of the systems on her organization's private network. These include systems in t
Natasha_Volkova [10]

Answer:

<em>B. 10.0.0.0/8. </em>

Explanation:

Using an 8-bit subnet mask ensures the <em>network address is represented by the first octet of the IP address and is very efficient.</em>

The suffix /8 implies that Beth checks all devices in the 10.0.0.0 network (hosts between 10.0.0.0 and 10.255.255.255).

8 0
3 years ago
Other questions:
  • Which type of security personnel may work for government as well as for private security agencies?
    7·2 answers
  • Identify the correct software or hardware applications in the passage below
    10·1 answer
  • 1. Write a bash script to create 3 files of different size greater than 1700 kb and less than 1800 kb . The 2. Content of the fi
    9·1 answer
  • The ____ function sums the numbers in the specified range and then divides the sum by the number of cells with numeric values in
    14·1 answer
  • What is the aperture and how does it impact sunrise/sunset photos? What is generally considered an ideal aperture for sunrise/su
    5·2 answers
  • Patricia is leading an online group of students from many
    8·2 answers
  • Unless grunkle stan pines is mistaken, there is a family of deer’s in his garden
    6·1 answer
  • 2. A well designed high-volume system will minimize _________ inventory and reduce _____________for the product or service. a) w
    7·1 answer
  • What do level meters show?
    8·1 answer
  • Explain the bad effect and good effect of mobile phone and internet.<br>​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!