Which of the following can be used to communicate ideas that would otherwise remain fuzzy or unshaped?

A) testing
B) documenting
C) scope
D) coding


D) coding

Computer Science & Information Technology

You might also like to view...

All personal computers include a hard drive built into the computer

Indicate whether the statement is true or false

Computer Science & Information Technology

What kinds of what-if analysis should be conducted to ensure a good decision is made?

What will be an ideal response?

Computer Science & Information Technology

Describe each of the following four kinds of access control mechanisms in terms of (a) ease of determining authorized access during execution, (b) ease of adding access for a new subject, (c) ease of deleting access by a subject, and (d) ease of creating a new object to which all subjects by default have access. • Per-subject access control list (that is, one list for each subject tells all the

objects to which that subject has access) • Per-object access control list (that is, one list for each object tells all the subjects who have access to that object) • Access control matrix • Capability What will be an ideal response?

Computer Science & Information Technology

Describe when you would use Save and when you would use Save As when saving a document.

What will be an ideal response?

Computer Science & Information Technology