1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
3 years ago
7

Checking for and correcting errors may need to be done numerous during which of the following phases of the software development

life cycle (SDLC)?
A.
planning

B.
designing

C.
developing

D.
testing
Computers and Technology
1 answer:
qaws [65]3 years ago
3 0

Answer: planning

Explanation:

You might be interested in
What is one of the disadvantages of a server-based network compared to a peer-to-peer network?
padilas [110]

One of the disadvantages of a server-based network compared to a peer-to-peer network is: 1) Additional costs.

<h3>What is a server?</h3>

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

<h3>Types of server.</h3>

In Computer technology, there are different types of server and these include the following:

  • Web server
  • Email server
  • File server
  • Database server
  • Proxy server

<h3>What is a Peer to Peer (P2P) Network?</h3>

In Computer networking, a Peer to Peer (P2P) network can be defined as a type of network that are designed and developed to connect similar computers that share data and software with each other at lesser cost in comparison with other network service.

In this context, we can infer and logically deduce that one of the disadvantages of a server-based network compared to a peer-to-peer network is additional costs.

Read more on Peer to Peer Networks here: brainly.com/question/1932654

#SPJ1

Complete Question:

What is one of the disadvantages of a server-based network compared to a peer-to-peer network?

1) Additional costs

2) none of these choices

3) Decentralized data access

4) Less secure

5) Difficult to expand

6 0
2 years ago
for number in range(1,51): if number % 3 == 0 and number % 5 == 0: print('XY') elif number % 5 == 0: print('X') elif number % 3
Elza [17]

Output of the given code is:

Y

X

Y

Y

X

Y

XY

Y

X

Y

Y

X

Y

XY

Y

X

Y

Y

X

Y

XY

Y

X

Explanation:

In the for loop variable "number" will iterate from 1 to 150(inclusive).

in the "if" condition it is checking that the number is divisible by 3 and 5 both if the number is divisible by both 3 & 5 then it will print XY as output.

In the first "elif", if the number is divisible by 5 only then it will print X

as output.And in the last "elif", if number is divisible by 3 only then it will

print Y as output. Nothing will be printed if all three conditions are FALSE.

7 0
4 years ago
Absolute time would be most similar to :
Luda [366]
The absolute time would be most similar to a fact. It was theorised and in fact, approved by scientists as a scientific law which governs, according to Wikipedia, as a "<span>true and mathematical </span>time<span>, of itself, and from its own nature flows equably without regard to anything external, and by another name is called duration: relative, apparent and common </span><span>time."</span>
3 0
4 years ago
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
In the INSERT statement that follows, assume that all of the table and column names are spelled correctly, that none of the colu
Firlakuza [10]

Answer:

The number of items in the column list doesn't match the number in the VALUES list.

Explanation:

The statement is:

INSERT INTO InvoiceCopy

(VendorID, InvoiceNumber, InvoiceTotal, PaymentTotal, CreditTotal,

TermsID, InvoiceDate, InvoiceDueDate)

VALUES

(97, '456789', 8344.50, 0, 0, 1, '2016-08-01');

As clearly seen, there are 8 number of items (VendorID, InvoiceNumber, InvoiceTotal, PaymentTotal, CreditTotal,  TermsID, InvoiceDate, InvoiceDueDate) but there are only 7 items in the values list.

Assuming the conditions given are true, it is seen the number of items in the column list does not match that of the values list, which identifies as a fault.

5 0
3 years ago
Other questions:
  • it is important to include the __ attribute of the tag because some people use text-only web browsers
    5·2 answers
  • Match the expenses to their respective categories.
    6·2 answers
  • Write, compile, and test a program named PersonalInfo that displays a person's name, birthdate, work phone number, and cell phon
    5·1 answer
  • E-mail messages, instant messages (IMs), or text messages sent and/or received within an organization a. are not included on a r
    9·1 answer
  • System A has two processors. Program X takes 50 seconds to execute on one of the processors. Program Y takes 50 seconds to execu
    8·1 answer
  • Describe PROM, EPROM and EEPROM memories​
    7·1 answer
  • I need help with this answer, I will give brainliest as long as there is actually an answer!
    11·1 answer
  • Which service uses a broadband connection?
    11·1 answer
  • It is better to know the main components of all computer programming languages than to memorize the rules for all of the languag
    14·2 answers
  • Answer pls pls pls pls ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!