Answer:
d. involves analyzing end-user business requirements in order to refine project goals
Explanation:
In the software development life cycle, the implementation stage is the stage where the computer programmers begin the actual coding of the application required by the end-user. At this stage, the developer takes into account the needs and specifications of the customer.
For example, if the end-user wants a software application that can track payment records, the researcher at this stage begins using the right software to code programs that can effect this function.
Answer: Software
Explanation:
Security certificate is defined as the assurance that maintain authenticity and intactness of a website or different sites.It is present in small sized data filed that establishes encryption and validation through verification of owner's identity.
- As per the suggestion of Webmaster, who takes care of web-pages and web-servers , security certificate should be purchased to verify the transmission of message with encryption.
- Certificate in this case will be acting as software for providing security and operations to the websites.
Answer:
<u>query,</u> <u>data mining </u>
Explanation:
A query can be explained as another term for question.
If one needs additional information from some other person, he might have ask to him. Queries are used for the retrieval of the information.
In other words, one tries to find what have been prepared by others.
Data mining can be explained as the process that allows to sort through a large set of data for the identification of patterns.
In this process of data mining, one tries to find out the new patterns that may not be known at all.
once you have sent the email it will only go to the server which then the person receiving it would log on therefore requesting the emails recived.
I'm not 100% sure my answer is classed as correct but I would say it doesn't go to a computer it just gets stored on a server in till requested