1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mojhsa [17]
3 years ago
12

In which phase of the software development process would probing questions be used to verify the problem definition?

Computers and Technology
1 answer:
Juliette [100K]3 years ago
7 0

Answer:

Analysis Phase

Explanation:

The Analysis Phase is where the project lifecycle begins. The Analysis Phase is where deliverables are broken down. The Analysis Phase is also the part of the project where the overall direction that the project will take through is identified. Also, in the Analysis Phase requirements are gathered. Gathering requirements in this phase involves probing users to know what they need and how they desire the system to function.

You might be interested in
5 efectos del desarrollo tecnológico en el medio ambiente
sineoko [7]

Answer:

english plzzz

Explanation:

5 0
2 years ago
Which of the following is a true statement about psychological tests administered by computers? computers make standardization e
Hitman42 [59]
Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions.
the true statement about psychological tests administered by computers is 
<span>most people find computerized tests to be difficult to understand. </span>
7 0
3 years ago
What is the synonym for term port?
Rus_ich [418]
The synonym for term port is seaport

3 0
3 years ago
The security administrator of ABC needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the host 10.0.0.3. Al
koban [17]

Answer:

The correct selection is the letter C. The first ACL is denying all TCP traffic and the other ACLs are being ignored by the router.

Explanation:

In this case, the letter C is the right answer because with the first ACL exactly:

access-list 102 deny tcp any any

We are denying all traffic with the next line deny tcp any any, in this case, the others line are being ignored.

access-list 104 permit udp host 10.0.0.3 any

access-list 110 permit tcp host 10.0.0.2 eq www any

access-list 108 permit tcp any eq ftp any

For that nobody can access to the internet, the security administrator of ABC must change the first ACL.

5 0
3 years ago
Answer this and you get free 100 points
Agata [3.3K]

Answer:

thanks my dude I needed it

5 0
3 years ago
Read 2 more answers
Other questions:
  • Design an algorithm for a bounded-buffer monitor in which the buffers (portions) are embedded within the monitor itself."
    10·1 answer
  • To the following is not a network connection LAM MAN SAN WAN
    9·1 answer
  • How do I make my own extension for chrome?
    7·1 answer
  • 2.
    8·1 answer
  • Can someone help me with this pls
    5·2 answers
  • After you have located a program name from the Start menu, in order to create a shortcut on the desktop.
    8·1 answer
  • Anyone who know hacking​
    7·1 answer
  • Please help me asapppp!​
    8·2 answers
  • In ip address 202.54.15.178, 15.178 is ______ address.
    8·1 answer
  • A friend asks you to look over the code for an adventure game and help figure out why it won’t work. Which of these options is s
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!