1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
3 years ago
10

Joshua Lee, an engineer at Footprints Inc., is provided with a design by the creative team in his company for creating a softwar

e that would help travel agents answer and track traveler requests efficiently. He is now converting the design into an operational information system. Which of the following phases of the SDLC is the software currently in?
Computers and Technology
1 answer:
tamaranim1 [39]3 years ago
7 0

Answer:

Development & implementation phase

Explanation:

There are mainly six stages of SDLC, which are as follows:

1. Planning: Planning is the first step in app development, where the developer preplans every aspect of the software.

2. Analysis: After planning, the developer analyzes further requirements to develop the software as per planning.

3. Design: After planning and analysis, the developer makes the design which is the main architecture of the software.

4. Development & implementation: When the developer completes the design, the development phase comes in where the data is coded and recorded as per requirement and after development, implementation takes place to see if software functions properly or not.

5. Testing: Testing mainly tests the programs to check for any errors or bugs.  

6. Maintenance: When the software is developed successfully, then time to time maintenance and updation of the software takes place to maintain and upgrade its working.

Hence according to the scenario, development & implementation phase is the right answer.

You might be interested in
External network security threats can include management failure to support organization-wide security awareness, inadequate sec
stiks02 [169]

Answer:

B. False

Explanation:

External security threat can be defined as any threats coming outside the company's computer network operation, usually carried out with negative or hostile intent for the purpose of stealing information or distracting the flow of operation. For example, Virus Attack

However, given that the question talked about the "management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures."

Hence, this is not an External Security Threat, which means, the correct answer is FALSE.

5 0
4 years ago
Please help!!!
Leona [35]

Answer:

C. Forms often provide special tools such as drop-down boxes for finding data.

Explanation:

3 0
3 years ago
Design and implement an application that uses dialog boxes to obtain two integer values (one dialog box for each value) and disp
dybincka [34]

Answer: hey

Explanation:

7 0
3 years ago
Sharon is troubleshooting a computer and wants to test the hard drive in another computer. Sharon removes the hard drive and not
andreyandreev [35.5K]

Answer:

Sharon would need a 'Molex connector' to test the hard drive she is using.

Explanation:

4 0
3 years ago
Random Pivot Selection: In the algorithm input elements are divided into groups of 5.
SSSSS [86.1K]

Answer:

A) The algorithm will work if they are divided into groups of 7

B ) If the groups of 3 are used they do not run in Linear time

Explanation:

ATTACHED TO THIS IS THE DETAILED PROVE OF  why the algorithm will work if they are divided into groups of 7 and also the prove that if groups of 3 are used they do not run in Linear time

3 0
3 years ago
Other questions:
  • "So far this month you have achieved $100.00 in sales, which is 50% of your total monthly goal. With only 5 more workdays this m
    8·2 answers
  • A restaurant chain has several store locations in a city (with a name and zip code stored for each), and each is managed by one
    9·1 answer
  • What kind of device is a cpu input or output?
    15·1 answer
  • A method countDigits(int num) of class Digits returns the remainder when the input argument num(num > 0) is divided by the nu
    10·1 answer
  • How do you know if your phone has a virus?
    13·1 answer
  • Similarities between drawing toolbar and editing toolbar​
    12·2 answers
  • Running the Disk Cleanup utility is a quick way to ________. Group of answer choices defrag your hard drive remove spyware progr
    10·1 answer
  • A large company has a LAN. The manager of the company wants to change it to a WAN
    10·1 answer
  • A system of classifying and organizing online content into categories by the use of user-generated metadata such as keywords is
    8·1 answer
  • How do you check to see if the user entered more than one character? Complete the code.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!