gracehope034
gracehope034 gracehope034
  • 23-06-2021
  • Computers and Technology
contestada

1) List two hardware methods that can be used to secure data
2)List two software methods that can be used to secure data

Respuesta :

jerryspringger
jerryspringger jerryspringger
  • 23-06-2021

Answer: Steps of the technological design process include: identify a problem, research the problem, generate possible solutions, select the best solution, create a model, test the model, refine and retest the model as needed, and communicate the final solution.

Explanation:

Answer Link

Otras preguntas

(y-2) = 3(×-1) what's the slope
HELP HELP 1 QUESTION!! ILL MARK AS BRAINLIST IF CORRECT AND EXPLAINED WELL!!!
Two satellites are in circular orbits around the earth. the orbit for satellite a is at a height of 540. km above the earth's surface, while that for satellite
The measures of two complementary angles are in the ratio of 5:7. what is the measure of the smaller angle?
If the area of a circle is 16pi what is the circumference of the circle, circle b, if its radius is 1/2 that of the circle a
Subduction only occurs when oceanic rocks are forced beneath a continent.
Amendments to the Constitution can be proposed by
How does the understanding of the structure of the atom help you see both unity and diversity in forms of matter?
Matching: Type the letter of each item in the left column by its match on the right, and then click "submit." Match each kind of drug to the effect that it has
List four contrasting differences between the 12 Tables and the Bill of Rights. List 3 similarities