Answer:
function validateForm(event)
{
event.preventDefault();
var phoneNumber = form.phoneNumber.value;
var userName = form.userName.value;
if(phoneNumber.length!=10)
console.log("Phone Number is Invalid");
if(userName.length<11)
console.log("User Name is Invalid");
}
Answer:
B. Incremental Build life cycle
Explanation:
RAD life cycle: RAD model of software development life cycle is all about coming up with prototype as soon as possible. It describes a method of software development which heavily emphasizes rapid prototyping and iterative delivery.
Incremental build life cycle: In incremental build model of software development life cycle, each release of the software have added capabilities. The development is finished when the user is okay with the present features. Focus is put on creating a working prototype first and adding features in the development life cycle. This is the correct option.
Waterfall life cycle: In a waterfall model, each phase must be completed fully before the next phase can begin and this usually takes time before a working software can be released. There is also no overlapping in the phases.
Spiral life cycle: Spiral Model can be pretty costly to use and doesn't work well for small projects. It's a risk-driven model which means that the overall success of a project highly depends on the risks analysis phase.
Answer:
TRUE
Explanation:
In telecommunication and computing, there are different units of data storage. The most commonly used units are the bit and the byte.
A bit is the capacity of the system having only two states.
Whereas, the byte, also known as octet, is equal to eight bits. The unit symbol for Byte is B. In many computers, it is the smallest addressable unit of memory.
Therefore, <u>the given statement is TRUE</u>.
Answer:
b. Redundant hardware and data backup systems
Explanation:
Data privacy is important where a company collects, processes and stores personal information.In the US-EU have laid down regulations to ensure data privacy is maintained. It is a requirement before collection of personal data, to clearly state why the data is being collected and how it will be used.The individuals whose data is being processed have a right to access their data at no cost during processing . Of great importance is the security of the data so as to maintain its integrity, Companies are required to take steps in protecting the data from unauthorized access, processing and accidental loss.redundant hardware and data backup system are used by companies as a fail-safe mechanism in data protection but they are not a requirement in data privacy, although they enhance it.