1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
3 years ago
9

Structured walk-throughs take place throughout the SDLC and are called _____ reviews, depending on the phase in which they occur

. code testing technical design
Computers and Technology
1 answer:
Tpy6a [65]3 years ago
5 0

Answer:

design

Explanation:

Based on the information provided within the question it can be said that these are called design reviews. This is one of the most important parts of the development of a system. This focuses more on answering how something is going to be done in the system as opposed to answering what is going to be done for the system depending on the questions asked in the analysis phase.

You might be interested in
A presentation software that is used to organize and present pertinent information using graphics, word processing, outlining, d
lesantik [10]

Answer:

C

Explanation:

Well, in your inquiry it says

"A presentation software that is used to organize and present pertinent information using graphics, word processing, outlining, drawing, and presentation management tools"

We know it isn't Microsoft Word, because Microsoft Word doesn't have a presentation feature. We know it isn't Excel because Excel is only meant for spreadsheet and analytics data.

However, on PowerPoint all these points make sense, PowerPoint is a tool that Microsoft created for the capabilities such as to present information, you can also put information inside of graphics as well, you can also draw, and outline too.

5 0
3 years ago
A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
Charra [1.4K]

Answer: Yes

Explanation:

Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system

  • According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.  
  • Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
8 0
3 years ago
Point out the wrong statement: SOA eliminates the use of application boundaries, the traditional methods where security is at th
love history [14]

Answer:

All the three statements given are true so the correct option is option 4 which is none of the above.

Explanation:

The options are given in a jumbled up form the options are sorted which are as follows:

  1. SOA eliminates the use of application boundaries, the traditional methods where security is at the application level aren't likely to be effective
  2. An atomic service cannot be decomposed into smaller services that provide a useful function
  3. XML security service may be found in retail application communication.
  4. None of the mentioned

SOA stands for Service Oriented Architecture. This eliminates the application boundaries so option 1 is true.

An atomic service is defined as the smallest service which cannot be divided further. So this is true as well

The XML security service is incorporated in all retail applications. so this is true as well.

So the remaining option is just None of the mentioned.

7 0
3 years ago
A DBMS makes the: a. relational database available for different analytical views. b. physical database available for different
xenn [34]

Answer:

a

Explanation:

Database Management System (DBMS) makes a relational database available for different analytical views.

3 0
3 years ago
What are the different types of Network Connectivity Devices?
mylen [45]

Explanation:

Types of network devices

Hub.

Switch.

Router.

Bridge.

Gateway.

Modem.

Repeater.

Access Point.

HOPE THIS HELPS YOU THANK YOU.

3 0
2 years ago
Other questions:
  • What command would you issue from a command prompt to see a listing of the computers in your workgroup?
    11·1 answer
  • You have several marketing documents that are published through AD RMS. However, you have three new marketing employees that req
    12·1 answer
  • An adiabatic capillary tube is used in some refrigeration systems to drop the pressure of the refrigerant from the condenser lev
    15·1 answer
  • Plzz help.... <br><br>i will mark u as brainliest if u answer correct
    10·1 answer
  • Fill in the blanks, so the print statement displays the result of the function call in order.
    12·1 answer
  • What is GIGO ?<br>plz answer me​
    7·1 answer
  • Whate is function of northe bridge<br>​
    12·1 answer
  • What will the "background-color" of the "topButton" be when the program is finished running?
    10·1 answer
  • What is the meaning of s used in 0 and 1 in computer .​
    8·1 answer
  • TIMED QUIZ
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!