The W5HH principle contains which of the following questions?A) Why is the system being developed? B) What will be done by whom?C) Where are they organizationally located?D) How much of each resource is required?

What will be an ideal response?


A, C, D

Computer Science & Information Technology

You might also like to view...

Which of the following configuration passes is applied during the portion of the installation where users are asked for information after the second reboot?

A. oobeSystem B. windowsPE C. specialize D. offlineServicing

Computer Science & Information Technology

A ________ is an application with which you can create, edit, and format text documents

A) word processor B) spreadsheet application C) database D) presentation application

Computer Science & Information Technology

A password-cracking attempt that checks all possible keys to decrypt data is called a brute force attack

Indicate whether the statement is true or false.

Computer Science & Information Technology

____ is an authentication protocol designed to work on client/server networks that use secret or symmetric cryptography.?

A. ?Kerberos B. ?DES C. ?3DES D. ?AES

Computer Science & Information Technology