Which of the following is not one of the four basic software development activities?

a) establishing the requirements
b) creating a design
c) preliminary practice coding
d) testing
e) implementing the design

c) preliminary practice coding

Computer Science & Information Technology

You might also like to view...

Tables contain all of the raw data in the database.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack?

a. buffer overflow b. session hijacking attack c. man-in-the-middle attack d. banner-grabbing attack

Computer Science & Information Technology