(A) Requirement identification
(B) Feasible study on the security
(C) Controlling and monitoring the project
(D) Screen idea consideration
View Answer(A) Requirement identification
(A) Requirement identification
(B) Feasible study on the security
(C) Controlling and monitoring the project
(D) Screen idea consideration
View Answer(A) Requirement identification