1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
3 years ago
11

FIRST AMSWER GETS BRAINLIEST! Select the correct answer. Bob is part of the design team in his office. The information that his

team produces in the design phase is valuable in coding and future phase of the life cycle of a project. What happens during the design phase of a software project? A. creation of a logical system structure using the gathered information B. feedback by customers on the working prototype C. gathering of new requirements to improve the product D. review of test cases before testing​
Computers and Technology
1 answer:
puteri [66]3 years ago
8 0

Answer:

Creation of a logical system structure using the gathered information

Explanation:

You might be interested in
How does information technology most benefit people’s personal and professional lives?
ozzi

As many as 79% of employees now “work on virtual teams,” be it by email, online collaboration, messaging, video conferences, or some combination of any of the above. A 2013 Pew Research study found “94% of jobholders are Internet users.” This includes full-time, part-time, and freelance workers in technology companies, big corporations, and small businesses, who work in cities, the suburbs, rural America, and everywhere in between.

For most of the last century, communicating professionally meant writing letters, sending faxes, or spending hours on the phone. Not anymore. Email is now the primary means of communication in the modern workplace. We are communicating more, faster, and better than ever before. And employers have been reaping the benefits. A major report cited by British newspaper The Telegraph found that the incorporation of technology into the workplace has led to an “84% increase in productivity per hour for office workers since the 1970s.” The major influencers? Email, business software, and yes, even cell phones.


3 0
2 years ago
Read 2 more answers
What problems do you see in the process of transacting business online
allsm [11]

Lack of Computer Expertise. ...

Difficulty Developing Relationships. ...

Privacy and Security Concerns. ...

Issues With Copyrights. ...

Limitations of Business Types.

4 0
2 years ago
What does CTR stand for?
ipn [44]

click through rate is the answer


6 0
3 years ago
Read 2 more answers
Specifically describe the design process for an Android phone application.
topjm [15]

Answer:

 The designing process of the various android applications is basically done by the XML and then, it is replaced by the HTML in the upcoming years. The XML is used as designing the front end applications in the android.

Wire-framing is the basic process of designing the various type of android applications and its is also called as creating the blueprint in the screen of android application.

The various step of designing the android phone application are as follow:

  • Firstly, define the actual reason of designing the app and then developed the app according to their actual requirement.
  • We must make a background research about the app so that we can innovate something new application to make this application more efficient and reliable.
  • Then, designing the app according the specific requirement and create the proper layout design. Then, build a proper prototype of the application.

7 0
3 years ago
Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
tiny-mole [99]

Answer:

a. social engineering attack

Explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.

6 0
3 years ago
Other questions:
  • Consider the following method.
    13·1 answer
  • On a hard disk each track is divided into invisible wedge-shaped sections called _______
    15·1 answer
  • Assume that an array of integers named a that contains exactly five elements has been declared and initialized. Write a single s
    15·1 answer
  • Password is an example of an authentication mechanisms that is based on " what an entity has".
    6·2 answers
  • In the space provided, analyze the pros and cons of becoming a member of an artistic guild. Your answer should be at least 150 w
    12·1 answer
  • The concept of taking traffic that’s all aimed at the same node and delivering it to the proper receiving service is known as
    8·1 answer
  • CSCU EXAM TEST FINAL1-A software or hardware that checks information coming from the Internet and depending on the applied confi
    6·1 answer
  • Running away from home
    11·2 answers
  • The process of getting listing information displayed on numerous other websites is:________
    8·1 answer
  • T/F static development is the process of constructing the programs and code modules that serve as the building blocks of the inf
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!