Answer:
It uses simple words and symbols to communicate the design of a program
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;
1. Planning.
2. Analysis.
3. Design.
4. Development (coding).
5. Testing.
6. Implementation and execution.
7. Maintenance.
A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language. Also, a pseudocode gives a summary of the steps adopted during a software development process using simple (concise) words and symbols.
This ultimately implies that, a pseudocode uses simple words and symbols to communicate the design of a program.
Answer:
XML (Extensible Markup Language):
Explanation:
XML (Xtensible Markup Language):
It is a markup language that is used for creating web-pages, it defines a set of rules that makes it readable both to humans and machine.
XML was primarily designed to be a software and hardware independent tool and it's focus was on data. XML provides a framework for defining markup languages.
XML, HTML and XHTML are all related to each other because they are all markup languages and can be used to build websites.
Basically,
-HTML is primarily for web-pages.
-XML is primarily for data.
-XHTML is a standard based on HTML that follows the strict rules of XML.
Answer:
Biometrics
Explanation:
Biometrics is the techniques that is used to measure and identify different characteristic of human being that are usually unique in nature for individuals such as voice characteristics, eye retina and finger prints. These features are unique for every person. These features could be used for different purposes now a day such biometric identification, biometric verification and for forensic purposes.
There are different algorithms to compute and compare these unique characteristics for each user and store in a database for the purpose of identification of the users. This data can also be used for forensic purpose if needed by some security agency to identify some person.
The type of identification in which these features such as voice, finger prints and iris pattern use is called biometrics.