1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ket [755]
3 years ago
7

In the SDLC's third phase, the way in which a proposed information system will deliver the general abilities described in the pr

eliminary design is described in the ________ design.
Computers and Technology
1 answer:
kifflom [539]3 years ago
3 0

Answer: Detailed

Explanation:

SDLC consist of 7 phases. They are:

1. Planning.

2. System analysis and requirement

3. Design:

4. Coding:

5. Testing:

6. Installation

7. Maintenance

Here we are talking of the third phase. In this phase it is the design phase which consist of high and low level design. Here the preliminary design is included in high level design where it describes the required hardware, software, network capabilities and the modelling of the interface. However the detailed design in low level design will implement the coding and will finding of any errors in the implemented design as described by the preliminary design.

You might be interested in
Which of the following store your information in the cloud?(select all that apply)
aniked [119]
It is number 3)usb flash drives
4 0
3 years ago
Read 2 more answers
While cloud services are useful for small and midsize analytic applications, they are still limited in their ability to handle B
sp2606 [1]

Answer:

False

Explanation:

There are cloud applications which can effectively handle big data.

For example processing and handling big data technologies like Hadoop, Spark can be used on cloud.

Services like <em>Amazon Web Services</em> or <em>Google Cloud Services</em> allows users analyze big data with various tools.

5 0
3 years ago
Why do attackers prefer to conduct distributed network attacks in static environments? (Select two.)
kozerog [31]

Answer:

These devices tend to employ much weaker security than traditional network devices and they're typically more difficult to monitor than traditional network devices.

Explanation:

3 0
2 years ago
In an email message, a name stored in the contact list or the email address of the original sender appears in the
Vadim26 [7]
The name or email address of the original sender will appear in the from line. The email is sent by that person, that is who the email is from.
7 0
3 years ago
Problems that are undecidable and algorithms that are unreasonable both touch on the limits of the kinds of computing
Verdich [7]

Answer:

An unsolvable problem is one for which no algorithm can ever be written to find the solution. An undecidable problem is one for which no algorithm can ever be written that will always give a correct true/false decision for every input value.

5 0
3 years ago
Other questions:
  • You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the
    15·2 answers
  • What is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing
    11·1 answer
  • A small business has suffered from a cyber attack, what could be the resultant damage​
    10·1 answer
  • Run-time parameters passed to a function allow you to use different values each time the function is called.
    6·1 answer
  • Write a method maxMagnitude() with two integer input parameters that returns the largest magnitude value. Use the method in a pr
    13·1 answer
  • Rapid va rog!!!!!!! Am 30 minute la dispozitie!! PLSSS !!!!!
    7·1 answer
  • What can cause noise?
    9·2 answers
  • In disc brakes, pads are forced against the of a brake disc​
    14·1 answer
  • The different languages that follow specific RULES. These languages use commands
    9·1 answer
  • Describe two features of a digital audio workstation that can be used to enhance a podcast
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!