You should ____ as the second phase in the program development life cycle, after the program requirements have been gathered and analyzed.

A. design the program processing objects
B. code the program
C. design the user interface
D. document the program


Answer: C

Computer Science & Information Technology

You might also like to view...

Suppose a business with annual sales revenue of $30 million wishes to use an ERP solution.  Which ERP vendor will have the most appropriate solution for them??

A. Tier I vendors such as SAP or Oracle. B. Tier II vendors such as Epicor or Lawson. C. Tier III vendors such as Abas or Bluebee software. D. Vendors from all three tiers would be appropriate.

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Automated data dictionaries are useful for only printing summary lists of data. 2. A data dictionary contains information about a data flow diagram, but not entities or use cases. 3. Databases are usually the first component of a data dictionary to be defined. 4. An internal data flow is one that connects two processes.

Computer Science & Information Technology

A security policy is a document that defines how an organization deals with some aspect of security

Indicate whether the statement is true or false.

Computer Science & Information Technology

The ______________________________ paved the way for anybody to offer a local telephone service to homes and businesses.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology