Answer:
Development, Introduction, Growth, Maturity and Decline.
Explanation:
The subsection which Frank is preparing for the SRS document that specifies data formats, data integrity, and storage capabilities is Logical Database Requirements.
<h3>What is SRS document?</h3>
SRS document of the software requirement specification document is the document which describes the function of a software and its procedure to perform a particular function.
Different types of requirement-
- A. External Interface Requirements- This includes the interface of used, such as layout of screen, button etc.
- B. Design Constraints- This includes the subcomponent of the system, such as performance requirement.
- C. Inverse Requirements- It defines that what a system can not do.
- D. Logical Database Requirements- Data of the user are saved in this such as profile, massage,data formats, data integrity, and storage capabilities etc.
- E. Non-Functional Requirements-This includes attributes of system, performance, security etc.
Frank is preparing a subsection of the SRS document that specifies data formats, data integrity, and storage capabilities.
Thus, the subsection which Frank is preparing for the SRS document that specifies data formats, data integrity, and storage capabilities is Logical Database Requirements.
Learn more about the SRS document here:
brainly.com/question/26161636
#SPJ1
Answer would be D)potential
Answer:
B. Implement a key escrow.
Explanation:
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.
After the 6 months, the trail is for 6 months so starting the day you signed up. So exactly 6 months from that day you will be charged.