1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katyanochek1 [597]
3 years ago
10

What are the possible consequences if requirements analysis was done poorly or inadequately? What are the objectives of requirem

ents analysis? What are the deliverables of this phase?
Computers and Technology
1 answer:
goldenfox [79]3 years ago
7 0

Answer: Requirement analysis is the process for analyzing any software project to gather the requirement and expectation of user that is required to make the software.If the analysis of the software is done improperly then the possible results will be as follows:-

  • Obtaining incomplete or incorrect requirements
  • Unclear understanding of the software project
  • Developing defected software etc

The main objection or aim of the requirement analysis are:-

  • Efficient software production
  • Developing software as per the requirement of the user
  • Helps in business development and facilitates them.

The output or deliverable gained from requirement analysis is obtaining  analyzed, validates, manageable software that will be able to conduct the desired task and fulfill the need of the user

You might be interested in
What is a header row?
777dan777 [17]

Answer:

b. the top row of a table that shows titles for the cells below

Explanation:

A header row is the first row of a given table that shows titles of the cells below it. In many cases, the header row has different styles from the other rows in the table. A header row can be found in, among others, both Microsoft's Excel and Word applications.

In the attached figure, the first row with a darker shade of background color is the header row for the table.

8 0
3 years ago
Midday is a good time to take a portrait outside.<br> true or false?
Over [174]

Answer:

B: False

Explanation:

edg2020

4 0
3 years ago
Read two numbers from user input. Then, print the sum of those numbers. Hint - Copy/paste the following code, then just type cod
Dmitriy789 [7]

Answer:

The full program is:

<em>num1 = int(input()) </em>

<em>num2 = int(input()) </em>

<em>print(num1 + num2)</em>

<em />

Explanation:

Given

<em>num1 = int(input()) </em>

<em>num2 = ?</em>

<em>print(num1 + ?)</em>

<em />

Required

Replace ? with the right codes

Line 1: The syntax is correct

Line 2: The ? should be replaced with an integer input function to get input for num2.

So, the second line would be: <em>num2 = int(input()) </em>

Line 3: The ? should be replaced with num2 in order to calculate and print the required sum.

So, the third line would be: <em>print(num1 + num2)</em>

<em />

8 0
3 years ago
By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducti
castortr0y [4]

Answer:

The correct option to the following question is option (B). e-business.

Explanation:

E-business is stands for the Electronic business.

E-business is the business which is conduct by the uses of the internet, Web, extranet or intranet, etc.

E-business is also known as the online business where online transactions take place.

E-business facilitates our customers that the selling and the buying of the goods between the consumers and the merchants.

7 0
4 years ago
When making any change to the database structure, we may need to check for effects of the change on ________.?
IrinaVladis [17]
Data, foreign keys, constraints & triggers .
7 0
4 years ago
Other questions:
  • An important factor to consider when purchasing new software is to investigate how much storage the application and associated d
    8·1 answer
  • The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .
    13·1 answer
  • In a nondatabase, file-oriented environment, data is often partitioned into several disjointed systems with each system having i
    11·1 answer
  • Where is a 3D modeler most likely to work?
    6·1 answer
  • Which tcp/ip troubleshooting command should you use to determine whether a client and server are communicating with each other?
    7·1 answer
  • Which of the following is an electronic device, operating under the control of instructions stored in its own memory, that can a
    6·1 answer
  • Worth 30 pts
    9·2 answers
  • Which of the following is a correctly named cell?<br> B8<br> BB-8<br> 8-B<br> 8B
    11·1 answer
  • Think of an aspect of HTML that you found challenging to master. Why is that aspect of HTML important? What are some future situ
    6·1 answer
  • From a database point of view, the collection of data becomes meaningful only when it reflect
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!