1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alina1380 [7]
3 years ago
12

System inputs and outputs are produced at the end of the: A. systems analysis phase of the SDLC. B. systems planning and selecti

on phase of the SDLC. C. systems design phase of the SDLC. D. systems implementation and operation phase of the SDLC. logic modeling stage.
Computers and Technology
1 answer:
Savatey [412]3 years ago
5 0

Answer: A) systems analysis phase of the SDLC.

Explanation:

In accordance with system development life cycle(SDLC) , analysis phase is the stage where all the requirement and materials for the system are collected and ordered.The requirements are in the form of input and output which are extracted and documented to provide clear vision of outcome.

  • Other options are incorrect because design phase is for designing the format ans structure of system through input components. Planning and selection stage is making scheme through opting correct requirement for system.
  • Implementation and operation phase is the stage of implementing the components on system structure to make them perform their respective tasks. Logic modelling level is defining inputs , components, outputs in logical manner so that they provide desired result operating.
  • Thus, the correct operation is option(A).

You might be interested in
Which unit of computer is used to processed data?​<br>Please help!!!!!!
RoseWind [281]

Hello There!

AnimeVines is here!

Is it Central Processing Unit?

HopeThisHelps!!

AnimeVines

7 0
3 years ago
Read 2 more answers
These operating systems were referred to as command-based.
Doss [256]

{\underline{\boxed{\bf{MS - DOS \:  and \:  UNIX}}}}

3 0
3 years ago
Read 2 more answers
After sending input in the Chinese language to an AI system, Nina got numerous translations in the English language. Which chall
ad-work [718]

Answer:

i think its translation complexity

Explanation:

8 0
3 years ago
_____ targeting techniques increase the effectiveness of banners, rich media, and video ads.
Delvig [45]

Banner, rich media, and video ad effectiveness is increased through behavioral targeting strategies.

<h3>What are Behavioral targeting techniques?</h3>
  • A marketing strategy called "behavioral targeting" makes use of data about web users to enhance advertising campaigns.
  • The method entails obtaining information on a potential customer's web browsing and purchasing habits from a range of sources.
  • In order to assess which advertisements and messages will be most effective with a certain audience, behavioral targeting is used.
  • To launch personalized marketing, it makes use of behavioral data, such as what users do or don't do in your app, on your website, or with your campaigns.
  • An illustration of behavioral targeting would be if a customer frequently visited a website with evaluations of thermometers for home use or conducted a search for thermometers, then went to a website for the producer of thermometers.

To learn more about  Behavioral targeting techniques, refer to:

brainly.com/question/28025161

#SPJ4

4 0
2 years ago
Jane has an intent to penetrate the network in an organization. She has used passive reconnaissance to gather extensive informat
LUCKY_DIMON [66]

The  reasonable steps should the company have taken to prevent Jane from finding this information is to do a Vulnerability scanning or a A penetration test.

  • How To defend Against Port Scanning try and use or Install a Firewall and the use of TCP Wrappers.

<h3>What is  Vulnerability scanning?</h3>

This is a kind of passive reconnaissance techniques. This form of scanning is the process of auditing a said network. A vulnerability scanner is one that looks into the network or application to see issues but they do not attempt to exploit any vulnerabilities that is seen.

A penetration test (pen test) is known to be a form of ethical hacking that entails one to think like an attacker and find out ways to penetrate the target's security systems. This aim to:

  • Verify a threat exists.
  • Bypass security controls.
  • Actively test security controls.
  • Exploit vulnerabilities.

Learn more about penetration test  from

brainly.com/question/26555003

8 0
2 years ago
Other questions:
  • C programming:
    10·1 answer
  • which one of these steps describe saving a newly created file. click on the save icon. minimize the file. name the file. select
    12·2 answers
  • A word that has a specific, predefined meaning in a programming language is called
    8·1 answer
  • Whitch action should a user take to ensure that formatting is applied to a row? A. use the ctrl+a keys. B. highlight the whole t
    11·1 answer
  • How do new sources of power assist in the development of inventions?
    15·1 answer
  • Please tell me what is basic HTML tags and its function please ​
    8·1 answer
  • 1. Accessing calendars, contact information, emails, files and folders, instant messages, presentation, and task lists over the
    7·1 answer
  • Suppose you are an ISP that owns a / 22 IPv4 address block. Can you accommodate requests from six customers who need addresses f
    8·1 answer
  • How many binary digits does a single hexadecimal digit represent?
    13·1 answer
  • As part of your regular system maintenance, you install the latest operating system updates on your Windows 10 computer. After s
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!