answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ahrayia [7]
2 years ago
9

In this first journal assignment, you will explore the role of testing in the SDLC. You will explain the role and importance of

testing in the SDLC and describe any exceptions in which the testing stage would occur earlier or later than it typically does in the life cycle. Address the following questions:_______.A. What occurs during the testing stage of the SDLC?B. Why is the testing stage vital to a successful SDLC?C. Are there any exceptions in which the testing stage would occur earlier or later than it typically does in the SDLC? Explain.
Computers and Technology
1 answer:
timama [110]2 years ago
7 0
It is SDLC your welcome good luck
You might be interested in
3.26 LAB: Leap Year A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate a
Taya2010 [7]

Answer:

// program in C++ to check leap year.

// include header

#include<iostream>

using namespace std;

// main function

int main() {

// variable

  int inp_year ;

  // ask user to enter year

  cout<<"Enter year:";

  // read year

  cin>>inp_year;

  // check year is leap or not

  if (((inp_year % 4 == 0) && (inp_year % 100 != 0)) || (inp_year % 400 == 0))

  // if leap year , print leap year

     cout<<inp_year<<" is a leap year.";

  else

  // print not leap year

     cout<<inp_year<<" is not a leap year.";

  return 0;

}

Explanation:

Read year from user.Then check if year is divisible by 4 and not divisible by 100 or year is divisible by 400 then year is leap year.otherwise year is not  leap year.

Output:

Enter year:1712                                                                                                            

1712 is a leap year.

6 0
2 years ago
Read 2 more answers
Write a for loop to print each contact in contact_emails. Sample output for the given program:
Paladinen [302]

Answer:

Correct code for the above question which is written in the place of loop in the above question code:

for a,b in contact_emails.items(): # for loop to print the above items one by one.

   print(str(b)+" is "+str(a)) # print statement to print the item of the list.

Output:

  • The above code is in python language which display the output as the above question demands.

Explanation:

  • The above question code is in python language, so the for loop to prints the list is defined in the answer part.
  • The for loop syntax defined in the question part is not correct. It never gives the output which the question demands.
  • The above list defined in the question part is in the form of key-value pair which comes in the categories of the dictionary concept.
  • So to print the above list, any user needs an item function that will display the output in the key-value pair.
  • There is also needs two variables in the 'for' loop one is for key and the other is for value.

4 0
2 years ago
Iris called the company’s security hotline. The hotline is an anonymous way to report suspi- cious activity or abuse of company
marishachu [46]

Answer 1 :

if Iris had approached Henry, it might had become a personal matter rather than professional. Following the proper protocol is the best way to report in any organization.

Answer 2 :

Yes, Gladys should call the legal authorities. Federal Trade Commission (FTC) is the best agency to file a complaint prevention of corruption within a company.

Answer 3 :

Yes, she should have followed her chain of command because that is one of the many questions that an investigator will ask is if she reported it to her supervisor and human resources. Somehow in companies they use that term when it is somewhat of a legal issue. Internally if she knew the IT director and the security office she could have gone to them along with human resources. Outside I would say start with her local police department and they may have directed her to the proper channel.

Answer 4 :

What Henry did was not ethical even in the slightest. He used the flash drive without permission from the company, he knew he shouldn’t have, but he did it anyway. It is acted in a complete ethical way. If Iris had left this in a coffee station and forgot about it, then it would have been unethical behavior because she knew about it but didn’t whistle blow. There are security laws that get violated in this issue which is why it is unethical and troublesome.

5 0
2 years ago
Google Apps are an example of​ ________. A. platform as a service​ (PaaS) B. software as a product​ (SaaP) C. platform as a prod
iogann1982 [59]

Answer:

Option E is correct.

Google Apps are an example of​ software as a service (SaaS).

Explanation:

I'll provide definitions to each of them.

Platform as a Service (PaaS): hardware and software tools available over the internet.

Software as a product (SaaP): product, software, which is made to be sold to users, and users pay for licence which allows them to use it. A good example of SaaP is the Microsoft Office package.

Platform as a product (PaaP): This creates a platform for product owners to put their products & for people to get their required products.

Infrastructure as a Service (IaaS): cloud-based services, pay-as-you-go for services such as storage, networking, and virtualization.

Software as a Service (SaaS): software that's available via a third-party over the internet.

From these definitions, it is clear that Google apps are examples of software as a Service because all the Google apps are software's that's available via a third-party over the internet.

Hope this Helps!!!

6 0
2 years ago
What technology gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses?
goblinko [34]

Answer:

Classless Inter-Domain Routing

Explanation:

Classless Inter-Domain Routing (CIDR), pronounced “cider” or “sidder,” gets its name from the notion that it ignores the traditional A, B, and C class designations for IPv4 addresses and sets the network-host ID boundary wherever it wants to, in a way that simplifies routing across the resulting IP address spaces.

3 0
2 years ago
Other questions:
  • At one college, the tuition for a full-time student is $8,000 per semester. it has been announced that the tuition will increase
    7·1 answer
  • Susan is creating a spreadsheet, and she needs to enter the months of the year in column A. Susan should _____.
    15·2 answers
  • A(n) ______close to a cover letter leads to more interviews because you are contacting the employer. a. passive b. lengthy c. ac
    11·2 answers
  • What is a commonly publicized password sql injection string?
    10·1 answer
  • Which of these statements regarding mobile games is true? A. They are typically played indoors. B. They have detailed environmen
    7·1 answer
  • A cyber criminal sends a series of maliciously formatted packets to the database server. The server cannot parse the packets and
    13·1 answer
  • Splunk In most production environments, _______ will be used as the source of data input?
    12·1 answer
  • Describe different types of intrusions such as SQL PL/SQL, XML, and other injections.
    5·1 answer
  • A user called to inform you that the laptop she purchased yesterday is malfunctioning and will not connect to her wireless netwo
    15·1 answer
  • Nstructions
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!