Lucy is in charge of creating a user interface for a new app. During what phase of the project should she expect to complete her work?

A.
alongside the development of the app

B.
after the app has been developed

C.
during the testing phase

D.
during the design phase

Answers

Answer 1

Answer:

C option

Explanation:

Because in testing phase the game has been developed and test for errors in game.


Related Questions

Which of these problems is correct if the numbers are binary numbers?Group of answer choices1 + 1 = 21 + 1 = 100 + 0 = 11 + 0 = 10

Answers

Answer:

The last one is correct.  

Explanation:

Which line of code will allow the user to enter their current temperature to the nearest tenth of a degree?Group of answer choicesnum1 = input(""What is your temperature?"")num1 = int(input(""What is your temperature?"")num1 =float(input(""What is your temperature?""))1num = print(""What is your temperature?)

Answers

In programming we have different data types and in this question two data types was specified, Int and float, the only data type that can receive input to the nearest tenth of degree is float, hence, float(input(""What is your temperature?""))

Data types are use as place holders, we have the primitive and non-primitive data types

Example of data types are FloatArrayIntegerDoubleString

Learn more about data types at

https://brainly.com/question/179886

A(n) ________ address is the address that external entities use when communicating with your network.

Answers

Answer:

IP adress

Explanation:

the IP adress is like your home address but for your computer. it tells the whatever is connecting where it's located so it can find where to send the data

hellowsss im bord :>
add my media pls its lil bunny(bunni) shoty (shawty)

Answers

Answer:

Bold

Italicized

Underlined

BOLDLY UNDERLINED

Okay! I will! ;)

I adore rabbits too!

I even made a book about them!

(It's not published tho :( )

The ________ font is applied to titles and the ________ font is applied to all other text in slides.

Answers

Answer:

cursive on tile and original micky fount in the storybook

Explanation:

Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users

Answers

A type of wireless attack that is typically designed and developed to capture wireless transmissions coming from legitimate end users is referred to evil twin.

An evil twin can be defined as an illegitimate and fraudulent that is usually set up to capture wireless transmissions, especially by eavesdropping on the information transmitted by legitimate end users.

In Cybersecurity, an evil twin is an equivalent of phishing on a local area network (LAN).

Basically, an evil twin is a rogue wireless access point (AP) that is typically designed and developed to capture wireless transmissions and sensitive information coming from legitimate end users.

In conclusion, an evil twin is used by an attacker or hacker to gain an unauthorized access to sensitive information from legitimate end users.

Read more: https://brainly.com/question/5660386

Your grandmother tells you a dollar doesn't go as far as it used to. She says the "purchasing power" of a dollar is much less than it used to be. Explain what she means. Try to use and explain terms like inflation and deflation in your answer. ​

Answers

Answer:

The obtaining influence of a dollar is substantially less on the grounds that more cash is made and causes the value of the dollar greenback to diminish, making things increasingly costly. This is called swelling. In any case, when less cash is made, the value of a dollar greenback increments and things turn out to be more affordable. This is called flattening. As the years go on, the purchasing power of a dollar decreases and decreases.

Hope that helps. x

Which of the following describes email nonrepudiation?

A.
the elimination of emails that may contain dangerous viruses

B.
the review of every email sent by the CIA

C.
the use of tracking methods that can identify senders and their locations

D.
the use of encryption methods that ensure senders and their locations cannot be identified

Answers

Answer:

I believe the answer is C, im sorry if im wrong

While on vacation, Joe receives a phone call from his identity alert service notifying him that two of his accounts have been accessed in the past hour. Earlier in the day, he did connect a laptop to a wireless hotspot at McDonald's and accessed the two accounts in question.
Which of the following is the most likely attack used against Joe?
A. Unauthorized association
B. Honeyspot access point
C. Rogue access point
D. Jamming signal

Answers

The most likely form of cyber attack that was used against Joe during his vacation is: B. Honeyspot access point.

A honeyspot access-point refers to a network system that appears to be legitimate but fraudulent because it is usually set up to capture wireless transmissions, especially by eavesdropping on the sensitive information that are being transmitted by cyber attackers and hackers.

This ultimately implies that, it is usually set up as decoy to lure unsuspecting cyber attackers and hackers, in order to detect, deflect and study their attempt to gain unauthorized access to the network.

In this scenario, a honeyspot access-point was used against Joe during his vacation because he connected to a wireless hotspot at McDonald's.

Read more: https://brainly.com/question/5660386

Which of the following is a responsibility of CTSO membership?

getting all As in your classes

traveling to a national conference

conducting yourself appropriately and professionally

getting a job in your career field after graduation

Answers

Answer:conducting yourself appropriately and professionally

Explanation:

2021 edg

How do I type fast?

Give me an actual answer...

Answers

Practice!
And a good keyboard I recommend mechanical key boards
But the best way to improving your WPM is definitely practice one way you can practice is playing typeracer it’s pretty fun way

Hope this helps!
Brainliest is much appreciated!

Answer:

Use all 10 fingers and remember where the keys are.

Explanation:

This may take a while to get used to, but just let your hands flow across the keyboard. There really isn't a specific way to do it, but there are websites that'll help you.

The ________ command is one of the most commonly used command-line commands. It can be used to check IP connectivity between two network devices.

Answers

Answer:

ipconfig

Explanation:

That is the actual

command

a network consisting of nodes covering a small geographic area is a

Answers

Answer:

that is a Local Area Network (LAN)

Emily is deciding whether to buy the same designer jacket her friends have. The jacket is much more expensive than a similar one from a lesser-known brand. Which questions should she consider before she buys the jacket? Check all that apply. Is advertising influencing her? What are her motivations? Has she compared prices? Is she buying at the right time? Will her sister like the jacket too?

Answers

Is advertising influencing her?
What are her motivations?
Has she compared prices?
Is she buying at the right time?

The questions that she should consider before she buys the jacket are:

Is advertising influencing her?What are her motivations?Has she compared prices?Is she buying at the right time?

What  is buying?

The act of buying an item is known to be acquiring a specific possession, or ownership/ rights to the use that thing or services. This can only be done through payment that is mostly based on the use of money :

Note that before getting something, one must consider other things such as  prices and the reasons for buying the item before one can go ahead to purchase that thing.

Learn more about buying from

https://brainly.com/question/25745683

1. What is the difference between a columnn and a row?
2. How many rows are being used?
3. How many columns are being used? rows?
3. Who got the highest grade on Quiz 1? What is its cell reference?
5. What is the range of cell of all the names of the students?

Answers

1. Column is like the one shows as A B C it’s like a Group. row is like each person from the group like Column A is the students names Column B is their 1st quiz grades I’m sorry if ur confused I’m bad at explaining it

what is a copy of a theme with different color schemes called?

Answers

Answer:

A copy of a theme with different color schemes is called a Variant

Explanation:

Is this statement true or false? While in slide show mode, a click and drag is no different than a click. True false.

Answers

In slide show mode, it should be noted that a click and drag is the same as a click. Therefore, the statement is true.

It should be noted that slide show mode typically occupies the full computer screen. One can see how the graphics and animations will look during the actual presentation.

Rather than waiting and clicking, one can make the PowerPoint files open directly in the slide show mode. Therefore, it's not different from clicking.

Learn more about slideshow on:

https://brainly.com/question/25327617

Answer:

"True"

Explanation:

I took the test!

Lenovo Diagnostics - UEFI Version is preloaded into the BIOS on all Lenovo products except for ____________________.

Answers

Based on the information given, it can be noted that Lenovo Diagnostics - UEFI Version is preloaded into the BIOS of their products except the Ideapad models.

It should be noted that Lenovo diagnostic tools are used primarily to diagnose any hardware problems that a computer may have.

Lenovo diagnostic tools are available as a Bootable or a downloadable package. Lenovo Diagnostics - UEFI Version is preloaded into the BIOS of their products except for the Ideapad models.

Learn more about Lenovo on:

https://brainly.com/question/25397058

if a granola bar has 5.7 grams of protein in it how many centigrams of protein does it contain?

A. 57

B. 0.57

C. 570

D. 5,700 ​

Answers

The answer is 570 hope it helps

URGENT!! thank you!!!!!

Answers

Answer:

Robots or automatons

Explanation:

Machines that can perform tasks historically performed by humans can improve productivity (they can work non-stop) and of course the environment is safer for workers (work is done by a machine instead) but there is job loss (people who used to do the machine's work are redundant).

If you know that a file for which you are searching starts with the letters MSP, you can type ____ as the search term.

Answers

Map I think it is the answer

define the term malicious program

Answers

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

Write a 20 charecter poem! for points! :)

Answers

you are wonderful as you are blue you are as blue as the sky the sky is beautiful as u are too you are red as Rose's and Rose's are full of you winter time is the mood full of winter and snow

When you first purchase a notebook, make sure you have a ____ CD containing the installed OS so you can recover from a failed hard drive.

Answers

When you first purchase a notebook, make sure you have a RECOVERY CD. It enables the restoration of the notebook computer.

A recovery disc is a disc that enables to restore the computer to the same condition when it was bought.

Moreover, a recovery drive refers to a separate partition in the notebook that must contain the required files to restore the device if the system becomes unstable.

A recovery disc can be considered as a drive used to keep a backup of the files (e.g., images) and other types of restoration data.

Learn more about recovery disc here:

https://brainly.com/question/14217813

PA theme is a major message that a writer convoys through a text. you have explored many themes in the hobbit one theme in the novel is that good has the ability to triumph over evil. using specific examples from the text, explain how this theme develops over the course of the novel

Answers

Answer:

The Hobbit’s main theme is Bilbo’s development into a hero, which more broadly represents the development of a common person into a hero. At the beginning of the story, Bilbo is timid, comfortable, and complacent in his secure little hole at Bag End. When Gandalf talks him into embarking on the quest with Thorin’s dwarves, Bilbo becomes so frightened that he faints. But as the novel progresses, Bilbo prevails in the face of danger and adversity, justifying Gandalf’s early claim that there is more to the little hobbit than meets the eye.??????

Explanation:

What do software engineers use as tools to provide automated support for the development of the system

Answers

Answer: CASE

Explanation:

In the earliest stages of human history, what was the only medium?
ink
books
the human body
magazines

Answers

The only medium that was used for the dissemination of information during the earliest stages of human history is: C. the human body.

Information sharing is an integral part of human life because no human is able to live comfortably in isolation without the need to share or receive messages from others through a particular medium, especially for awareness, growth, development and proper decision making.

Prior to the medieval period, which is the earliest stage of human history, the human body serve extensively as the only medium that was used for the dissemination of information from one person to another.

This ultimately implies that, various symbols, signs and objects that were  mutually understandable to the people were drawn or written on human body, so as to serve as a medium during the process of communication.

Read more: https://brainly.com/question/14810228

URGENTT 2 SIMPLE EASY QUESTIONS PLZZ HELP ION UNDERSTAND COMPUTERR ILL GIVE U BRAINLEST

Answers

Answer:

I'll happy to help

Explanation:

Please make your clear. I couldn't understand!

Please clear your question I can’t understand

When a number gets assigned to a variable that already has a value __________. the new number overwrites the previous value at that memory location the new number gets assigned to a neighboring memory location the computer issues an error the new value is destroyed and the old value remains

Answers

Answer: the new number overwrites the previous value at that memory location

Explanation:

When a number gets assigned to a variable that already has a value, the new number overwrites the previous value at that memory location. The correct option is A.

What is assigning value?

To "assign" a variable is to symbolically link a specific piece of data to a name. Any operations performed on this "name" (or variable) must be true for all possible values.

The assignment operator is the equals sign, which should never be used for equality, and should never be followed by the double equals sign.

To assign a value to a variable, use the simple assignment operator. The assigned value is evaluated by the assignment operation.

It is possible to chain the assignment operator to assign a single value to multiple variables.

When a variable receives a new value, the previous value is overwritten.

Thus, the correct option is A.

For more details regarding assigning value, visit:

https://brainly.com/question/28587274

#SPJ2

the service you are attempting to use is restricted

Answers

Services can be restricted due to different factors. If when an individual have received calls on their cell phone and the device's caller ID shows "Unavailable" or "Restricted," It can be due to a lot of factors.

Note that caller ID designations are brought about by the settings on the caller's end or network restrictions and not the phone's settings.

When a Cell phone calls designated shows "Unavailable" on a phone's caller ID, it means that the placed from an area or region is, is where the wireless service provider or phone company cannot be able to retrieve that phone number.

A "Restricted" phone call is said to be a call from a caller who has blocked one's phone so that you cannot identify their number.

Learn more about restricted from

https://brainly.com/question/15870692

Other Questions
what are integer solutions to the equality below-2 < x < 2 effect of looping the loop 10+20=What someone answer Six movie tickets cost $96 what is the cost per ticket Find the EXACT distance between the two points.(4,7) and (4,9) During economic downturns, the federal budget is likely to grow simply fromincreases in the cost of Francesca is part of a team that is experiencing the storming stage of the collaboration process. What soft skill is being used during this time? Conflict resolution Goal setting Leadership Organization In the late 19th century, which of the following reasons suggested that the United States needed to expand? . If there are 20 girls in a class of 30 students, find out the percentage of boys in the class? Please help me, its urgent! How did the Chinese political system influence Kublai Khans government?Kublai Khan kept Chinese bureaucracy in place.Kublai Khan kept Chinese social classes as they were.Kublai Khan kept the Chinese tax system in place.Kublai Khan kept Chinese laws and fines as they were. help me and i will mark you the brainlyist Scientists can use aircraft to better understand hurricanes. Which two kinds of information about hurricanes can scientists gather using aircraft. Determine whether each figure creates the conditions to form a unique triangle, more than one triangle, or no triangle. Angle measures of 30 degrees, 60 degrees, and 90 degrees.no trianglea unique trianglemore than one triangle 708.97 as a fraction PLEASE HELP!!! A golfer hits a ball with an initial velocity of 32.7 m/s from the ground. Find the following (round all answers to 2 decimal places...no units):When does the ball hit the ground? ___What is the highest height the ball goes? ___When does the ball reach its max height? ___How high is the ball after 4.3 seconds? ___When is the ball 24 meters off the ground? ___ and ___ (enter the smaller value first) what study, which may or may not have been complete fiction, detailed the events following the planned admission of several psychologists into psychiatric institutions? What is the central point that Hamilton is making? The 13 states were too unwilling to reach an agreement. Compromise was a necessary part of uniting 13 different states. The 13 states are only united because of their feelings of friendship. Too many compromises were required during the Constitutional Convention. An irregularly shaped object weighs 11.20 N in air. When immersed in water, the object has an apparent weight of 3.83 N. Find its density. Esma has a box that is 20 cm wide 10 cm high, and 10 cm deep she wants to fill the box with packages that are 5 cm wide 2 cm high and 2 cm deep what is the greatest number of packages that she can put in the box with out it overfilling Find the roots of the equation: y^2-1/16=0