1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maru [420]
2 years ago
10

ven if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are

Computers and Technology
1 answer:
makkiz [27]2 years ago
3 0

Complete Question:

Even if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are;

Group of answer choices

A. policy and procedure development

B. use case activity diagram testing

C. method design and coding

D. data conversion and user training

Answer:

C. method design and coding

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are six (6) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Deployment.

6. Maintenance.

Among the listed stages, there are two (2) most important stages which cannot be ignored in the creation of a software application are.

<em>Hence, even if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are method design and coding.</em>

I. Method design: this is the third step of the software development life cycle, it comes immediately after the analysis stage. This is the stage where the software developer describes the features, architecture and functions of the proposed solution in accordance with a standard.

II. Coding (development): this is the fourth step in the software development process and it involves the process of creating a source code which would enable the functionality of the software application.

You might be interested in
When you take a multiple-choice test, you are relying on ________, a means of retrieving information out of your long-term memor
Karolina [17]

Answer:b)Recognition

Explanation: Recognition method is the technique which is based upon the similarity of the structure.It basically compares between the received format and the format of the reference on the basis of their structure.It is considered as a good method of the retrieving the image or format which is in storage. This usually results in opting the correct answer or option.

Therefore, the correct answer is option (b).

8 0
2 years ago
______ is using material created by others without obtaining permission from the original authors.
Leto [7]
Plagiarism is the answer to the blank
6 0
3 years ago
Read 2 more answers
Explain the importance of determinism in an industrial LAN
nevsk [136]

Explanation:

 Determinism in an industrial local area network (LAN) basically improve the network and allow different types of technology use in various applications.

It basically refers to the network communication that uses various types of technology in the system like time scheduling to improve the deterministic real-time communication. It basically improve the transmission and provide ability to transfer data from one point to another.

The main importance of industrial LAN that it provide more flexible and efficient ethernet network in the system. It provide communication and interconnect various types of devices in the internet for efficient communication.

3 0
3 years ago
Which for loop syntax is correct?
Ugo [173]

Answer:

C

Explanation:

3 0
1 year ago
can someone tell me what to do i’m kinda stuck and don’t know what he’s telling me to do pls ill give brainlist and points
Alexandra [31]

Answer:

Well a debtor is basically someone owing someone money, basically someone in debt. He’s telling cup head boy to take care of the people who owe him or someone else their or his money. Thats basically it.

8 0
2 years ago
Other questions:
  • Illustrate the process of using an operating system to manipulate a computer’s desktop, files and disks.
    12·1 answer
  • Checking tire pressure should be performed:
    11·2 answers
  • Help, please!! A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code. aFil
    6·1 answer
  • Most browsers allow you to maintain your most frequently visited websites. what is this called? Special place holder, secret lis
    6·2 answers
  • Create a program that will read in a Salesperson name, employment status (1=Full-time AND 2=Part-time) and the sales amount.
    5·1 answer
  • how do I delete my brainly account, my child signed up for it and nothing has been paid but I do not want the account to exist a
    7·2 answers
  • Are you absent minded because you are thinking of an online activity?​
    12·1 answer
  • Stroke weight - ____ of the line around a shape or size of the point
    8·1 answer
  • In java I need help on this specific code for this lab.
    5·1 answer
  • 10.13 lab 10c: output range with increment of 5 write a program whose input is two integers. output the first integer and subseq
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!