1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
3 years ago
9

Structured walk-throughs take place throughout the SDLC and are called _____ reviews, depending on the phase in which they occur

. code testing technical design
Computers and Technology
1 answer:
Tpy6a [65]3 years ago
5 0

Answer:

design

Explanation:

Based on the information provided within the question it can be said that these are called design reviews. This is one of the most important parts of the development of a system. This focuses more on answering how something is going to be done in the system as opposed to answering what is going to be done for the system depending on the questions asked in the analysis phase.

You might be interested in
What is the name of the relationship between two ospf devices that are connected together and exchange link-state information?
Rudik [331]

Answer:

FULL neighbor state.

(FULL/DR or FULL/BDR)

Explanation:

The fact that the routers are neighbors is not enough to guarantee an exchange of link status updates; they must form adjacencies to exchange link status updates. Adjacency is the next step after the process of establishing neighbors. Adjacent routers are routers that go beyond a simple Greeting exchange and act in the database exchange process. To reduce the amount of information exchange in a given segment, OSPF selects a router as a designated router (DR) and a router as a designated backup router (BDR) in each multiple access segment. The BDR is chosen as the backup mechanism in case the DR fails. The idea behind this is that routers have a central point of contact for the exchange of information. In order to verify if two routers have established an adjacency, you can use the command: show ip ospf neighbor.

Here is an example:

R1#show ip ospf neighbor

 

Neighbor ID   Pri         State               Dead Time     Address      Interface

 

203.250.12.1    1     2WAY/DROTHER  0:00:37   203.250.14.3  Ethernet0

203.250.15.1    1     FULL/DR                0:00:36   203.250.14.2  Ethernet0

203.250.13.41  1     FULL/BDR              0:00:34   203.250.14.1  Ethernet0

5 0
3 years ago
Information System (IS) designed to provide reports to managers for tracking operations, monitoring and control is ________
Ghella [55]

Answer:

Management Information System(MIS)

Explanation:

management information system can be regarded as an information system

that is engaged in decision-making as well as the coordination and control and analysis of information in an organization. It involves processes as well as people and technology when studying the management information systems in organizational view.

In Management Information System(MIS) data can be gotten from the database, as well as the compilation of reports, this report could be inventory-level reports,

financial statements/analysis so that routine decision can be made by the manager. It should be noted that Management Information System(MIS) is the Information System (IS) designed to provide reports to managers for tracking operations, monitoring and control.

6 0
3 years ago
HOMEWORK: Bud, Not Buddy I NOTICE... What do you see? chpter 3-4<br><br>​
steposvetlana [31]

Answer:

Check Explanation for Chapter 3 - 4 Summary!

Explanation:

Chapter 3:

Bud tries hard not to panic in the pitch-black darkness of the shed. The eyeballs of three dried-out fish heads stare back at him as he tries the doorknob, which he hopes Mr. Amos only pretended to lock. While deciding where to lay his blanket and pillow, he remembers the story of the cockroach crawling into his best friend’s ear back at the Home. From the story his friend, Bugs, tells, the cockroach was yelling, “My legs! My legs! Why have they done this to my legs?” while adults tried to extract it with tweezers. Bud wants to avoid any encounters with the cockroaches that are surely crawling over the shed’s floor, ready to crawl in his ears. He spreads his blanket on the top of the woodpile and climbs up.

Bud attacks the bat with a rake, only to discover that he has disturbed a hornet’s nest. Hornets sting him as he grabs for the doorknob hoping for escape. In his haste, he forgets about the fish heads with their razor-like teeth. He screams as the teeth cut into him, and the hornets continue to sting. He manages to escape through a window above the wood pile and falls to the ground, slapping at the hornets still attacking him. He heads towards the Amoses’ house, set on revenge.

Chapter 4 Summary:

Bud climbs into the Amoses’ house through an unlocked window. He finds his suitcase still under the kitchen table and puts it on the back porch step. Back in the house, he grabs Mr. Amoses’ shotgun and hides it outside, so if the Amoses wake up, they wouldn’t use it on him.  

Bud returns to the kitchen. He fills a glass with warm water and heads up to Todd’s room. Todd is sound asleep. Bud dips Todd’s fingers in the warm water, hoping he’ll wet his bed. When he doesn’t, Bud pours the water on Todd’s pajama pants, causing Todd to soak his sheets. Bud creeps out of the house, grabs his suitcase, and heads toward the road, now “on the lam ... just like Public Enemy Number One.”

Hope this helps! Let me know if you have any questions! :)

5 0
3 years ago
What scheme is usually used today for encoding signed integers?
dusya [7]

Answer:

 For encoding signed integer the two's complement scheme are used as, the number can be positive, with no fraction part and it can be negative. The computer can stored information in the form of bits and the value with the zero and one. Encoding of signed number in the two's complement with the positive integer it can be done by binary number.

6 0
3 years ago
What is this type of car?
Butoxors [25]
Nissan titan crew cab sv png
4 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program whose input is an email address, and whose output is the username on one line and the domain on the second. Exam
    9·1 answer
  • A/An ___ is a series of instructions or commands that computer follows used to create software
    10·2 answers
  • 4. What is a pentaprism? What job does it do in the camera?
    9·2 answers
  • External hard disks use different technology than internal hard disks. ture or false
    6·1 answer
  • Many people object to increased cybersecurity because _____.
    12·2 answers
  • What does the Send Backward icon allow a publisher to do?
    9·1 answer
  • Given a Fully Associative cache with 4 lines using LRU replacement. The word size is one byte, there is one word per block, and
    8·1 answer
  • A/an ____ file saves a workbook as a comma-delimited text file for use on another windows operating system??
    9·1 answer
  • My serious question that needs answering pronto!!!
    11·1 answer
  • In a swap you need a variable so that one of the values is not lost ? Need help
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!