You should ____ as the second phase in the program development life cycle, after the program requirements have been gathered and analyzed.
A. design the program processing objects
B. code the program
C. design the user interface
D. document the program
Answer: C
You might also like to view...
Suppose a business with annual sales revenue of $30 million wishes to use an ERP solution. Which ERP vendor will have the most appropriate solution for them??
A. Tier I vendors such as SAP or Oracle. B. Tier II vendors such as Epicor or Lawson. C. Tier III vendors such as Abas or Bluebee software. D. Vendors from all three tiers would be appropriate.
Answer the following statements true (T) or false (F)
1. Automated data dictionaries are useful for only printing summary lists of data. 2. A data dictionary contains information about a data flow diagram, but not entities or use cases. 3. Databases are usually the first component of a data dictionary to be defined. 4. An internal data flow is one that connects two processes.
A security policy is a document that defines how an organization deals with some aspect of security
Indicate whether the statement is true or false.
The ______________________________ paved the way for anybody to offer a local telephone service to homes and businesses.
Fill in the blank(s) with the appropriate word(s).