1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Xelga [282]
4 years ago
15

In what stage of systems development are design specifications created?

Computers and Technology
1 answer:
timofeeve [1]4 years ago
5 0

The stage of systems development in which design specifications (such as the architecture, the modules, the interfaces, and the data) are created is the stage of systems design. The purpose of systems design is primarily to satisfy the specified requirements.

You might be interested in
In safety matters what comes first the people or the film
Leokris [45]

Answer:

the people.

Explanation:

if somebody dies, the person in charge is going to get held responsible.

6 0
3 years ago
Which of the following menu commands would you select to make a copy of an open file and rename it?
jonny [76]
Copy or replace either one
3 0
3 years ago
Sarah is a detail-oriented programmer. While testing her program, what other skill would she have to apply in order to detect al
Talja [164]

Answer:

A. troubleshooting

Explanation:

Troubleshooting is the process of trying to detect problems with a software or hardware component so as to apply solutions to it.

Therefore, Sarah would need troubleshooting skills to help her test her program to detect all bugs and fix it.

3 0
3 years ago
What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and
Stolb23 [73]

Answer:

National Software Reference Library (NSRL).

Explanation:

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

National Software Reference Library (NSRL) is the primary hash algorithm used by the National Institute of Standards and Technology (NIST) project created to collect all known hash values for commercial software and operating system (OS) files.

7 0
3 years ago
Give<br> 25<br> Input devices examples
GarryVolchara [31]
Keyboard
Microphone
Mouse
Pen
Image scanner
Touch pad
Light pad
8 0
3 years ago
Other questions:
  • Can someone help me out with this one? I'm not sure why my code is not working
    11·1 answer
  • What is encyclopedia. Com considered to be?
    14·1 answer
  • Which statement best describes when Variable Substitution (expansion) can occur?
    6·2 answers
  • What is the output of the AWK program?
    11·1 answer
  • How to type the horizontal line on Mac ? Please I need to finish my assignment
    8·1 answer
  • Why a commerce student must learn about SDLC (Software Development Life Cycle) and its phases?
    12·1 answer
  • A.
    11·1 answer
  • Write a program code to accept the names of 3 users and generate a user name as shown in the example. Accept the name of 3 user
    9·1 answer
  • Which of these is a physical health benefit provided by playing team sports? A. a spiritual connection to others B. lower choles
    5·2 answers
  • What is the name of the general ledger that tracks all bitcoin transactions?.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!