1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
2 years ago
7

Which terms represent the two types of client requirements?

Computers and Technology
2 answers:
stepan [7]2 years ago
8 0

Answer:

FUNCTIONAL AND NON-FUNCTIONAL

Client requirements is a statement of need, might then be prepared which is a first attempt to describe the possible requirements of the project. This may or may not result in the development of a new business project, and even if a project is necessary, it may not require a new building.

Hope this helps you

Eddi Din [679]2 years ago
3 0

Answer:

The client's requirements for a project might initially include a vision, mission and objectives for what they wish the project to achieve. A statement of need, might then be prepared which is a first attempt to describe the possible requirements of the project.

You might be interested in
Is there a way to search your computer for all music files on it?
Slav-nsk [51]
Yes their is a way go to your downloads see if you have some thing or their shall be something that you can type in your computer and find something or you can go to Youtube or google and they can show you a video or some articles.
5 0
3 years ago
I need help 40 points and brainless if you answer
Reil [10]
The answer is c
But I’m not sure
8 0
3 years ago
Read 2 more answers
Business application software programs make it possible to
Daniel [21]
Business application software programs make it possible to: increase productivity in the office setting.
Please give me Brainless if this help!!
6 0
2 years ago
What is the term given to the controls that let you interact with an operating system?
Sophie [7]
Inputs are the contols that let you interact with an operating system.
4 0
3 years ago
A security administrator is conducting a penetration test on a network. he connects a notebook system to a mirror port on a netw
svetoff [14.1K]

Active fingerprinting is the process the administrator use in the penetration test and the following uses hacking techniques to actively discover inner vulnerabilities is Penetration testing also <span>vulnerability scanning is made within the security perimeter; penetration testing is performed outside of the security perimeter.</span>

7 0
2 years ago
Other questions:
  • Which of the following can you NOT apply for at any FLHSMV office? A. Certificate of title B. License plates C. Vehicle registra
    15·2 answers
  • If you are upgrading your operating system to Windows 7, you may not use the In-Place Upgrade Installation Option with
    14·1 answer
  • A(n) _____ evaluates a specified data set and returns certain fields from that data set as instructed.
    10·2 answers
  • An idea concerning what will happen in the future. (Crossword)
    9·1 answer
  • The approved systems design document is used by programmers, the personnel department, and information systems personnel.
    8·1 answer
  • Which of the following definitions describes a chemical hazard?
    8·2 answers
  • A transcript must bear a(n)___ to be considered official
    15·2 answers
  • Pre-made, copyright-free illustrations are called __________. apps clip art graphic design stock photos
    6·1 answer
  • You are attending to a neighbor who is unresponsive, not breathing normally, and pulseless. Your spouse has left to activate EMS
    8·1 answer
  • associate true with the variable has_dups if the list list1 has any duplicate elements (that is if any element appears more than
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!