1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maru [420]
3 years ago
10

ven if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are

Computers and Technology
1 answer:
makkiz [27]3 years ago
3 0

Complete Question:

Even if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are;

Group of answer choices

A. policy and procedure development

B. use case activity diagram testing

C. method design and coding

D. data conversion and user training

Answer:

C. method design and coding

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are six (6) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Deployment.

6. Maintenance.

Among the listed stages, there are two (2) most important stages which cannot be ignored in the creation of a software application are.

<em>Hence, even if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are method design and coding.</em>

I. Method design: this is the third step of the software development life cycle, it comes immediately after the analysis stage. This is the stage where the software developer describes the features, architecture and functions of the proposed solution in accordance with a standard.

II. Coding (development): this is the fourth step in the software development process and it involves the process of creating a source code which would enable the functionality of the software application.

You might be interested in
Running the disk cleanup utility is a quick way to ________.
Likurg_2 [28]
Clear out unnecessary files, for example caches, caches are a collection of items of the same type stored in a hidden or inaccessible place.
8 0
3 years ago
Examine about the Internal &amp; External Fragmentation methods give an example for each. essay​
Tju [1.3M]

Internal Fragmentation occurs when a process needs more space than the size of allotted memory block or use less space. External Fragmentation occurs when a process is removed from the main memory. Internal Fragmentation occurs when Paging is employed. External Fragmentation occurs when Segmentation is employed.

3 0
3 years ago
How does computer applications affect our lives daily? 1- paragraph (4 sentences)
Mnenie [13.5K]

Answer:

Computers affect our lives daily because we use them everyday to browse the internet and solve problems in real life. They help solve problems and without them, getting certain information would be much harder. They help us interact with friends from anywhere in the world and communicate with relatives. It has also helped us during this pandemic and lets us learn from school in the safety of our own home.

( hope this helps, i wrote it myself ;-; )

4 0
3 years ago
Read 2 more answers
I have a project on "USING ADVANCED FORMULAS". It wants me to make a spreadsheet to track payroll. I have no clue how to do this
ANTONII [103]
Try to do it on Microsoft word 2013
7 0
3 years ago
When planning the structure of a spreadsheet, columns are for _______ items and rows are for _______ items?
zvonat [6]
<span>C: single and single

</span>
3 0
3 years ago
Other questions:
  • How do i divid 521 to the nearest tenth
    12·2 answers
  • Keep the base of your _________ on the mouse pad or desk?
    12·2 answers
  • Jimmy wrote the procedure scoreToGrade which accepts as a parameter score - a quiz score in the range 0-100. The procedure is su
    8·1 answer
  • One factor in algorithm performance that we've not had a chance to speak much about this quarter, but one that is certainly rele
    6·1 answer
  • Matt is a senior developer for Cyber Protect, a company that helps secure management information systems. Matt's new task is to
    8·1 answer
  • In a typical e-mail address, the "host" is user: which one of the following word processing features saves you the most time whe
    8·1 answer
  • Which of the following about Java arrays is true?
    14·1 answer
  • A source is:
    15·2 answers
  • Several programmers write individual code modules that are used for different processes in a vehicle. Individual tests have alre
    13·1 answer
  • Can someone give me an earsketch song of summer to turn in
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!