Which is the most threatens to a software during the maintenance phase?

A. Change Request Board
B. software upgrades
C. Change Requests
D. no testing procedures


Answer: B

Computer Science & Information Technology

You might also like to view...

A specific item of data or information located within a table is called a ________

A) field B) key C) report D) record

Computer Science & Information Technology

An email address is made up of two parts separated with an at symbol, the user name of the recipient, and the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A process in which an Access file is rewritten to store the objects and data more efficiently

a. Run Performance Analyzer b. Create ACCDE c. Compact & Repair

Computer Science & Information Technology

Choosing to merge only records with the ZIP code 39440-1203 is called ____ records.

A. arranging B. filtering C. merging D. sorting

Computer Science & Information Technology