1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DanielleElmas [232]
3 years ago
7

In what software development model does activity progress in a lock-step sequential process where no phase begins until the prev

ious phase is complete?
Computers and Technology
1 answer:
den301095 [7]3 years ago
5 0

Answer:

"Waterfall" is the correct answer for the above question.

Explanation:

  • The Waterfall model is a model which is the first model recognized by some scientists is used to states some rules to develop the software. It is based on the phases of the SDLC. The SDLC is the collection of phase that is used in software development.
  • The waterfall model moves like water moves. It means any next phase starts if the previous phase is completed and the user can not move into previous steps of the model.
  • This is also asked by the question. Hence the answer is the waterfall model.
You might be interested in
To exclude members of a group from the basic permissions for a folder, which type of permission would you assign? Deny Allow Mod
oksano4ka [1.4K]

Answer:

Deny

Explanation:

Under the New Technology System, the Deny permission is applied when the administrator wants to overrule the permission given to members of a group. The Allow and Deny options help in regulating access to the components of the system. Only authorized groups are granted access to the files.

Most times, the Deny permission is considered before the Allow permission. If the user is denied access to some files and granted access to some, the deny permission is most times considered first.

4 0
3 years ago
A cell reference is also called a cell _______.
viva [34]
A cell reference is also called a cell address.
7 0
3 years ago
Why is local hosting not suitable for a public website?
ruslelena [56]

Answer:

Because its only available to the host

Explanation:

8 0
2 years ago
You can set a ________, which is automatically displayed in a field unless the user enters something different.
Wittaler [7]

Answer:

Place holder

Explanation:

In computer programming, placeholder is a word, character or series of characters that is used to take up the space until the time when the space is actually needed. It is widely used in the sign up or login forms for web and mobile applications. For example, First Name, Last Name etc.

A programmer might have an idea that he will require this number of characters or values but he don't knows what the input will be, that’s why he uses the place holder.

Hope it helps!

6 0
3 years ago
provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,
Oxana [17]

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

3 0
3 years ago
Other questions:
  • 32.
    11·1 answer
  • The counter variable in the code below increments by 1 each time through the loop. What will the value of counter be after the f
    11·1 answer
  • file Assume that a prototype of the part above was built from several cubes. The total volume of the part is 0.54675 in.3. What
    6·1 answer
  • To create a new folder, press ____.
    12·1 answer
  • After you set a pin for a domain account on your laptop, that pin can be used only on your laptop. question 17 options:
    7·1 answer
  • Assume:
    14·1 answer
  • How to get out of compatibility mode in word?
    15·1 answer
  • I only put one answer and didn’t specify what it answered
    14·2 answers
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
  • which responses would you use for a computer or electronic medical record outage? (select all that apply)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!