Which is the most threatens to a software during the maintenance phase?
A. Change Request Board
B. software upgrades
C. Change Requests
D. no testing procedures
Answer: B
Computer Science & Information Technology
You might also like to view...
A specific item of data or information located within a table is called a ________
A) field B) key C) report D) record
Computer Science & Information Technology
An email address is made up of two parts separated with an at symbol, the user name of the recipient, and the ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
A process in which an Access file is rewritten to store the objects and data more efficiently
a. Run Performance Analyzer b. Create ACCDE c. Compact & Repair
Computer Science & Information Technology
Choosing to merge only records with the ZIP code 39440-1203 is called ____ records.
A. arranging B. filtering C. merging D. sorting
Computer Science & Information Technology