1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
2 years ago
7

A software development team needs to upgrade a program, but the team members are having trouble understanding the program code a

nd how it works. What could be the reason?
a. missing prototype
b. incomplete documentation
c. unfinished system proposal
d. inadequate feasibility study
Computers and Technology
1 answer:
labwork [276]2 years ago
7 0

Hey there mate :)

As per question,

Question:- A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. What could be the reason?

To find:- Write the correct option

Answer:- <u>Option </u><u>B.</u><u> </u><u>incomplete documentation</u>

Answer per sentence:-

A software development team needs to upgrade a program, but the team members are having trouble understanding the program code and how it works. This is due to <u>incomplete</u><u> </u><u>documentation.</u>

You might be interested in
3
sergiy2304 [10]

Answer: I believe this would be A.) choosing an alternative

Explanation:

6 0
2 years ago
Read 2 more answers
What is the full form of bcc please tell​
expeople1 [14]

Blind Carbon Copy

For emails. It is used to send a copy of the email to somebody without the original person receiving it knowing that you sent a copy.

3 0
2 years ago
Read 2 more answers
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
avanturin [10]

Answer:

A. Spoofing

Explanation:

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.

Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take

7 0
3 years ago
A Game Object must have a Transform<br><br> True<br><br> False
vovikov84 [41]

Answer:

Yes

Explanation:because,have to update there apps or games and change there characters

3 0
3 years ago
Which diagram is NOT a good model of 3÷14?
swat32
I need a pic for this
7 0
2 years ago
Read 2 more answers
Other questions:
  • 2. Write the binary representation of number 1037.379 in IEEE 754 standard in single precision. Express the result in binary, oc
    7·1 answer
  • Typing a ____________ at the beginning of a word will exclude that word when doing a search.
    8·2 answers
  • Suppose alice, with a web-based e-mail account (such as hotmail or gmail), sends a message to bob, who accesses his mail from g
    10·1 answer
  • What is the different between image processing and machine vision? Please explain with an example.
    11·1 answer
  • How can you keep your files organized on your computer?
    13·2 answers
  • Which of the following events would most likely produce an earthquake
    7·1 answer
  • Write a program that reads a list of integers, and outputs those integers in reverse. The input begins with an integer indicatin
    15·1 answer
  • For what purpose is keylogging software used? a. To automatically translate input to another language as the user enters data b.
    10·1 answer
  • In java please
    13·1 answer
  • State the function of the <br> BIOS,​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!