During the _____ phase of the systems development life cycle, people attempt to answer the questions, "What must the information system do to solve the problem?"

a. systems investigation
b. systems implementation
c. systems design
d. systems analysis


Answer: d. systems analysis

Computer Science & Information Technology

You might also like to view...

In order to make a forensically sound copy of a hard disk for analysis, it is critical that you employ a write-blocker. What does this device do that makes for a sound copy?

a. It performs bit by bit error correction of each sector of the source hard disk as it is copied to the target medium. b. It prevents rootkits from destroying the data when it detects the lauch of a copy routine. c. It prevents the OS from making any changes to the metadata of files as they are being copied. d. It is capable of reading the system files that are generally invisible to the host operating system of the target device.

Computer Science & Information Technology

The network architecture on which client computers rely on services provided by another computer is called _______

a. TCP/IP b. Hypertext transfer protocol c. Client-server d. FTP

Computer Science & Information Technology

The management protocol of IEEE 802.1x that governs the interaction between the wireless device, access point, and RADIUS server is known as the ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The variables in the method declaration that accept the values from the actual parameters are ____ parameters.

A. defined B. proper C. formal D. actual

Computer Science & Information Technology