1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
3 years ago
10

Joshua Lee, an engineer at Footprints Inc., is provided with a design by the creative team in his company for creating a softwar

e that would help travel agents answer and track traveler requests efficiently. He is now converting the design into an operational information system. Which of the following phases of the SDLC is the software currently in?
Computers and Technology
1 answer:
tamaranim1 [39]3 years ago
7 0

Answer:

Development & implementation phase

Explanation:

There are mainly six stages of SDLC, which are as follows:

1. Planning: Planning is the first step in app development, where the developer preplans every aspect of the software.

2. Analysis: After planning, the developer analyzes further requirements to develop the software as per planning.

3. Design: After planning and analysis, the developer makes the design which is the main architecture of the software.

4. Development & implementation: When the developer completes the design, the development phase comes in where the data is coded and recorded as per requirement and after development, implementation takes place to see if software functions properly or not.

5. Testing: Testing mainly tests the programs to check for any errors or bugs.  

6. Maintenance: When the software is developed successfully, then time to time maintenance and updation of the software takes place to maintain and upgrade its working.

Hence according to the scenario, development & implementation phase is the right answer.

You might be interested in
What happens when the programmer tries to access an array cell whose index is greater than or equal to its logical size?
just olya [345]

Answer:

When a programmer tries to access an item in an array cell whose index is greater than or equal to the array's logical size, this data element or item is garbage. This means that currently, the item is not the part of the program's useful data. Garbage contains objects or data which will not be used by a program running on it. So the value returned could be either of the two:

  • Value would be an arbitrary or random number if it is an array of numbers. Arbitrary means that the value is not predefined or specified in advance.
  • Value returned would be null if it is an array of objects.

                                                           

 

3 0
3 years ago
E-governance is the only solution against corruption. justify the statement in context of nepal​
notka56 [123]

Answer:

Following are the solution to this question:

Explanation:

The E-government implies use as part of the government systems to offer SMART, which is used to manage smart governance, ethics or accountability, sensitivity, and transparency. It is the research teams, that also shown that policies were progressing in India's creation of information technology. It is also argued against reducing the risk of bribery through improved public official surveillance and reducing its need for citizen engagement with porters with key services.

6 0
3 years ago
TLE 10 - ICT
Kipish [7]

Answer:

Information And Communication Technology

5 0
2 years ago
Horizontal and vertical flips are often used to create ___.
mixer [17]

Answer:

Rotation of an image

Explanation:

The correct answer is -  Rotation of an image

Reason -

When you rotate an object, it moves left or right around an axis and keeps the same face toward you.

When you flip an object, the object turns over, either vertically or horizontally, so that the object is now a mirror image.

5 0
3 years ago
If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature
Goshia [24]

The key would he use to create the digital signature is Mike public key.

<h3>Which key is used to sign messages?</h3>

Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that  uses a private key to encrypt signature-linked data.

The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.

Learn more about  public key from

brainly.com/question/17486027

7 0
2 years ago
Other questions:
  • What is the command to use the memory diagnostics tool?
    11·1 answer
  • Are commonly used to control the number of times that a loop iterates?
    5·1 answer
  • Which of the following would be a considered a want rather than a need for most people?
    15·1 answer
  • Explain what occurs when you synchronize computer and mobile devices.
    5·1 answer
  • What is the network id with cidr notation for the ip address 172.16.32.108 with the subnet mask 255.255.255.0?
    10·1 answer
  • My mom works from home selling her craft work online to people all over the world. She can do this from home because we have acc
    13·2 answers
  • Using a cell phone while operating a motor vehicle is considered distraction because
    8·1 answer
  • In order for bitlocker to protect the system volume without the aid of an external drive, your computer must:
    12·2 answers
  • g 'write a function that takes as input a list and outs a new list containing all elements from the input
    5·1 answer
  • During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!