1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MatroZZZ [7]
3 years ago
5

Dan's team has to develop billing software for a supermarket. During which step will they write the program for the software?

Computers and Technology
1 answer:
Alexxandr [17]3 years ago
6 0

Answer:

coding phase

testing/debugging phase

Explanation:

During the coding phase they will write the actual code which creates the functionality/program which is added to the software. This phase comes after the dev team designs the algorithm and creates a flow chart of the algorithm. This flow chart is what is used to create the code itself. After the code is complete then the dev team will go into the testing/debugging phase where they will test the program with different test cases. If any bugs/errors are found they will return to the code and implement changes to fix these errors.

You might be interested in
What will be displayed after the following code is executed? def pass_it(x, y): z = x*y result = get_result(z) return(result) de
Rus_ich [418]

Answer:

The output of the following code is "14".  

Explanation:

In the python program firstly we define a function that is  pass_it() function. In this function, we pass the two variable that is x,y. Then we define two variable z and result in the function. The z variable is used to store the multiplication value of the x,y. In the result variable, we use another function that is get_result() function in this function we pass the value of the z variable as a parameter. This function adds a value that is 2 and returns its value. Then we declare a variable that is num1 and num2. In this variable, we assign value that is 3 and 4 and return value of the pass_it() function in the answer variable and print it.  

7 0
3 years ago
Which was the first wiki based website
stira [4]
WikiWikiWeb was the first made by <span>Cunningham.</span>
5 0
3 years ago
Read 2 more answers
How does the occupational outlook affect the monetary benefits of a career
Ksivusya [100]
If there are changes to the responsibilities in a career, the typical outcome will change.
4 0
3 years ago
What name is given to any changes to the original data such as users manually modifying data, programs processing and changing d
nadezda [96]

Modification is the name given to an attack that makes changes into original data such as users manually modifying data, programs processing and changing data, and equipment failures.

In modification attacks, only changes are made to original data without deleting it completely. Modification is basically a type of attack in the context of information security. This type of attack creates annoying situations and discords by altering existing data in data files, inserting new false information in the network and reconfiguring network topologies and system hardware.

Modification attack is mainly mounted against sensitive and historical data. Modification attacks target integrity of the original data with an intent of fabricating it.

You can learn more about ha-cker attack at

brainly.com/question/14366812

#SPJ4

3 0
1 year ago
How to automatically ccleaner smartphone?
denis23 [38]
Ccleaner for Android can be set to automatically run on schedule. But please check have u update it.
<span />
8 0
3 years ago
Other questions:
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • Cell phone producers charge a _____, which consumers pay to buy the phones. profit production cost price
    12·1 answer
  • An individual is first with the network before they are authorized to access resources on the network A. countermeasure B. vulne
    11·1 answer
  • Universal Containers is implementing a community of High-Volume Community users. Community users should be able to see records a
    12·1 answer
  • Suppose that class OrderList has a private attribute double cost[100] which hold the cost of all ordered items, and a private at
    14·1 answer
  • Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s person
    7·2 answers
  • Visual culture is an area of academic study that deals with the totality of images and visual objects produced in ____________,
    6·1 answer
  • Identify the type of error described
    6·1 answer
  • Which of these is a type of social engineering attack?
    10·1 answer
  • How do you open an application on the macOS?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!