1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
3 years ago
10

You don’t design new software. Instead, you work with software that already exists to be sure that it keeps running smoothly. Wh

ich phase of the software design life cycle are you concerned with?
Group of answer choices
Computers and Technology
2 answers:
Basile [38]3 years ago
8 0

Answer: Maintenance

Explanation: it's maintenance because it's not your software but your making sure it's running smooth so your maintaining the software making sure it's running right so your maintenance maintaining the software

Arada [10]3 years ago
5 0

Answer:

Explanation:

If you are developing software products, run complex projects, you should ... All the same, to make the right choice of an SDLC methodology, you ... Generally, there are stages involved in all the different methodologies. ... You will therefore have to keep both the old and new systems running for some time.

You might be interested in
Write the header for a function addOne that accepts a single integer reference parameter and returns nothing. Name the parameter
Butoxors [25]
In C++ it would be: void addOne(int& x);

In C# it would be: void addOne( ref int x)

In JAVA you would have to package the integer inside an object, since it doesn't pass value types by reference.
5 0
4 years ago
A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting th
Damm [24]

Answer: white hat hacker

Explanation:

Like other forms of hacker, white hat hackers also have wide range of knowledge of breaking into systems, overriding firewalls, bypassing security protocols and can also do all other things hackers do. But what differentiates white hat hackers is the motive behind what they do, in that they carry out all this test not for their personal gain but for the benefit of the owners and also with the approval of the owners. Because after carrying out tests on the ways of exploiting the loop holes in the system they reveal it to the manufacturer or system owners for correction.

4 0
4 years ago
Write a program (C++) that reads a number between 1,000 and999,999 from the user where the user enters a comma in the input.Then
mr Goodwill [35]

<u>C++ program to print the digit without a comma </u>

#include<iostream>

#include<string>

using namespace std;

void commaremoval(string num)  /*Defining function commaremoval with parameter num of string type*/

{  

string  s=num;

for(int i=0; i< s.length();i++)

   {

    if(s[i]!=',') /*Checking whether the string doesn't contain ' ,' */

       cout<<s[i];  //Printing Output without comma

   }  

}

//driver function

int main()

{

string num;

cout<<"Enter a digit between 1,000 and 999,999:"<<endl; /*taking input from user*/

cin>>num;

commaremoval(num); //calling function

return 0;

}

<u>Output</u>

Enter a digit between 1,000 and 999,999:  22,343

22343

7 0
3 years ago
Anyone knows how to do this??
a_sh-v [17]
I dont know how to do that
4 0
3 years ago
What does a closed-envelope icon next to an e-mail message header indicate?\?
Fynjy0 [20]
That it was unread that’s what mine means
7 0
4 years ago
Other questions:
  • An operating system is an example of which of the following
    13·1 answer
  • Which component of the Hyper-V architecture controls all communication with the physical hardware on the computer?
    8·1 answer
  • What components are in hard drives?
    12·1 answer
  • Which collaboration website is best suited for social collaboration? www.media.iearn.org/projects www.meetup.com www.quest.nasa.
    9·1 answer
  • A user on a home network needs to boost the signal of the wireless router. What should the user purchase to accomplish this?
    14·1 answer
  • Which of the following are common data types? Check all that apply.
    6·1 answer
  • A company is deploying NAFDs in its office to improve employee productivity when dealing with paperwork. Which of the following
    11·1 answer
  • You created a database related to computer hardware parts and their details. You'd like to view the names of the parts in alphab
    9·1 answer
  • (python) Given the formula for conversion from Celsius to Fahrenheit
    10·1 answer
  • Assume that the Vehicle class contains a virtual method named CalculateMaxSpeed(). Assume that both the MotorVehicle and Automob
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!