1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
3 years ago
6

An application team plans to follow the 10-phase SDLC model. After the team identifies both functionality and security requireme

nts, they begin coding. However, after a few weeks, confusion sets in between team members. What is the most logical reason for the confusion
Computers and Technology
1 answer:
Valentin [98]3 years ago
3 0

Answer:

The team did not adequately formalize the software's design

Explanation:

The most logical reason for this confusion is the fact that the team did not adequately formalize the the software design.

The design approach has to do with clearly defining the architectural modules of the application. The requirements in the software requirement specification document would serve as input for the next phase. The documents are prepared and they give a definition of the overall system architecture.

The team got confused because they did not go through this phase of the 10-phase SDLC model.

You might be interested in
A circuit contains three resistors connected in parallel. The value of R1 is 2 K , the value or R2 is 6 K , and the value of R3
brilliants [131]
The value of total resistance of resistors connected in parallel is calculated through the equation,
      
                      R = 1 / (1/R1 + 1/R2 + 1/R3 + 1/Rn)

Substituting the known values,

                     R = 1 / (1/2 + 1/6 + 1/10)
                           R = 30/23 ohms

The formula for power with the use of resistance and voltage is,

                         P = V² / R

Substituting,
                         P = (100 V)² / (30/23 ohms)
                         P = 7.67 kW

Thus, the answer to this item is letter C.  
6 0
4 years ago
Create a set of use cases for the following health club membership system:
Sveta_85 [38]

Answer:

The use case diagram is attached.

Explanation:

Create a set of use cases for the following health club membership system:

When members join the health club, they pay a fee for a certain length of time. Most memberships are for one year, but memberships as short as two months are available. Throughout the year, the health club offers a variety of discounts on its regular membership prices (e.g., two memberships for the price of one for Valentine's Day). It is common for members to pay different amounts for the same length of membership. The club wants to mail out reminder letters to members asking them to renew their memberships one month before their memberships expire. Some members have become angry when asked to renew at a much higher rate than their original membership contract, so that the clubwants to track the price paid so that the manager can override the regular prices with special prices when members are asked to renew. The system must track these new prices so that renewals can be processed accurately. One of the problems in the healthclub industry is the high turnover rate of members. While some members remain active for many years, about half of the members do not renew their memberships. This is a major problem because the health club spends a lot in advertising to attract each new member. The manager wants the system to track each time a member comes into the club. The system will then identify the heavy users and generate a report so that the manager can ask them to renew their memberships early, perhaps offering them a reduced rate for early renewal. Likewise, the system should identify members who have not visited the club in more than a month so that the manager can call them and attempt to reinterest them in the club.

The use case diagram is attached.

3 0
3 years ago
In distributed dos attacks, the attacker sends messages directly to ________. bots the intended victim of the dos attack backdoo
kirill115 [55]
The word DoS refers to the Disk Operating System. In the case given above, if it happens that there is a distributed DoS attack, the attacker then sends messages directly to the BOTS. Bots refer to internet or web robots. Hope this answer helps. The answer is the first option.
4 0
4 years ago
John wants to use graphical elements on his web page. Which image formats should he use to keep the file size manageable?
asambeis [7]

Answer:

PNG, GIF

Explanation:

On a Web page, we'll assume he'll have simple graphic elements like icons, or other simple low-resolution and a lower number of colors (256-), these are usually better saved in GIF format to take less space, just because of the smaller color map, but PNG could also do a great job and  it offers transparency as well (like GIF does).

For more complex elements (larger size and/o more colors like photos), the best format to save them is probably the PNG one.  They will be compressed but still offer a great quality.

7 0
4 years ago
To create an interactive Pivot Table for the web, we use a Ms office web component known as,
charle [14.2K]

Answer: Pivot Table Report

Explanation:

To create an interactive Pivot Table for the web, we can use a Ms office web component which is known as the pivot table report.

We should note that the pivot tables are simply used for the summarizing of data. Huge amounts of data can be processed with them, after which a report showing sums, averages, totals and every other calculations can be gotten.

5 0
3 years ago
Other questions:
  • Which qualifications are typical for someone working in Marketing Information Management and Research?
    6·1 answer
  • why are the ads you might see on tv between 8am and 10am usually not the same ads you would see between 8pm and 10pm?
    12·1 answer
  • What does it mean to “declare a variable”? create a variable use a variable share a variable modify a variable
    11·2 answers
  • Robert’s computer is not working properly. It has become too slow to respond to programs. What can he do to maintain his compute
    15·1 answer
  • I need like 10 sentences to delineate and discuss societal issues related to computing . “Including the guiding principles of pr
    9·1 answer
  • Hey guys im just curious.... whats ur favorite number
    6·2 answers
  • Hãy giúp tôi giảiiii​
    14·1 answer
  • A technology called ______
    11·1 answer
  • Can you show me how to code this is GDBonline? explaining each statement with notes//
    7·1 answer
  • Using programming libraries is one way of incorporating existing code into new programs.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!