The conceptual phase of any system or just the software facet of a system best describes the sdlc

Answers

Answer 1
Answer: i think its the systems investigation phase.

Related Questions

____ control the way one slide replaces another on-screen during a presentation
Rear brakes do less work during hard braking than the front brakes because ________.
Why are the social and ethical consequences of emerging technology hard topredict?
What is Chromolithography and did it help logo design?
Two electronics technicians are discussing the electric series. Technician A says that if you rub a piece of glass with a piece of wool cloth, the glass will receive a negative charge. Technician B says that if you rub a piece of aluminum with a piece of flannel, the aluminum will receive a negative charge. Which of the following statements is correct?A. Only Technician A is correct. B. Neither of the two technicians is correct. C. Only Technician B is correct. D. Both Technician A and Technician B are correct. Two electronics technicians are discussing conductors and insulators. Technician A says that conductors have more free electrons than insulators. Technician B says that insulators have lower resistance than conductors. Which of the following statements is correct? A. Only Technician B is correct. B. Both Technician A and Technician B are correct. C. Neither of the two technicians is correct. D. Only Technician A is correct.

Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the system, hosted at the vendor's site, using a webbrowser. Which service delivery model is Kaira's company using?

Answers

Answer:Software as a Service (SaaS)

Explanation: Software as a service(SaaS) is the software model that consist of the services don by it in the distributed form. There is presence of the third party or external factor that helps in providing the internet with the users It is the widely used in the area of cloud computing.

Kaira's company is also tending to used the software as service model(SaaS) for their company to maintain the connection of the system's host and employees.

The Top status bar command is used to display the highest value in the selected range in the AutoCalculate area. (True/False)

Answers

It is True

Hope it helps

____ is the knowledge, tools, and techniques used to transform inputs into outputs

Answers

techonology is the knownledge,tools, and techniques used to transform inputs into outputs

You are creating a document for your students at school using Words 2013. You are concerned that some of your students have older versions of word. How can you ensure that your students can open up these word files in older versions of word?

Answers

How can you ensure that your students can open up these word files in older versions of word?

The best way to ensure that your students can still open is to make sure and tell them that they should not save their file as '.docx' file but rather a '.doc' file. In that way, the '.doc' file can be opened in any version of Microsoft word.

Answer:

Save them as .doc files.

Explanation:

which of the following would most effectively reduce / mitigate social engineering incidents? security awareness training intrusion detection and prevention systems increased physical security measures email monitoring

Answers

In order to effectively reduce or mitigate social engineering incidents, it is important to employ a multi-pronged approach that includes prevention, detection, and response measures.

One key element of prevention is security awareness training, which can help employees recognize and avoid common social engineering tactics such as phishing emails and phone scams. By educating employees on how to identify and respond to these threats, organizations can significantly reduce their risk of falling victim to social engineering attacks. In addition to security awareness training, intrusion detection and prevention systems can help organizations detect and block suspicious activity on their networks. These systems can monitor network traffic for signs of unauthorized access or suspicious behavior, and can alert security teams to potential threats in real-time. Similarly, increased physical security measures such as access controls and surveillance cameras can help deter and prevent social engineering attacks that rely on physical access to sensitive areas.

Finally, email monitoring can be an effective way to detect and prevent social engineering attacks that are delivered via email. By scanning incoming emails for malicious attachments or links, organizations can block these threats before they have a chance to reach their intended targets. Overall, a comprehensive approach that combines prevention, detection, and response measures is essential for effectively mitigating social engineering incidents and protecting sensitive data and systems.

Learn more about engineering here: brainly.com/question/4962714

#SPJ11

A quarterback takes a hard hit and is carried off the field on a stretcher. Why might he have a better chance of recovery than quarterbacks of previous generations?

Answers

Padding used in today's game is better than in previous generations, for one. Second, there are better helmets in today's game. Third, there are better-trained therapists and medical attendants who are more able to diagnose and treat a player's injuries than in the past.