1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga2289 [7]
2 years ago
6

One word for The characters typed by a user using a keyboard.

Computers and Technology
1 answer:
scoray [572]2 years ago
5 0

Answer:

Alt codes hope this helps.

You might be interested in
In _____ conversion of the implementation phase of the systems development life cycle (SDLC), the old and new systems run simult
coldgirl [10]

Answer:

b. parallel

Explanation:

According to my experience on information technology, I can say that based on the information provided within the question the term being mentioned is called Parallel Conversion. Like mentioned in the question this term refers to when two systems run at the same time while transferring operations in order to make sure that everything is running correctly and are outputting the same results.

If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
Which of the following describes colors, spacing, borders, and other effects that change the appearance of a table?
lisabon 2012 [21]
It is the table style that describes colors and spacing borders and other effects that change the appearance of the table
5 0
3 years ago
The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed
Zepler [3.9K]

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

3 0
3 years ago
Read 2 more answers
The ability of services to grow or shrink based on need is called __________.
Talja [164]
This kind of ability is called rapid elasticity. The resources can be maximized by a consumer to provide wider webs and applications.It can also make the server stop, just to reduce the cost in the process.  The flexibility in adapting to needs of a company is an advantage. Rapid elasticity can be done in a public cloud.
3 0
3 years ago
Compare and contrast the role that business users play when software is developed using Waterfall and Agile software development
qaws [65]

Answer: Both Agile and waterfall model are software development models to deliver a final outcome in the form of a software product. Waterfall model is sequential process with the requirements beings rigid and defined before beginning the software development.

Agile method basically  concerned with the requirements of the client. Here both testing and development is carried out at the same time.

Explanation:

More differences between the two include :

Waterfall model is easy to manage whereas in agile model as the the client requirements changes and wants more functionalities is becomes a bit more difficult to manage. the role of project manager is very crucial in waterfall model whereas the role of developers ans testers is more important in Agile model.

8 0
3 years ago
Other questions:
  • A company decides to create static design diagrams for an upcoming project. Which statement correctly describes the attribute of
    6·1 answer
  • If you wanted to make certain numbers in a spreadsheet stand out, you should _____.
    11·2 answers
  • Write a function named printtriangle that receives a parameter that holds a non-negative integer value and prints a triangle of
    7·1 answer
  • You work as an IT Technician for uCertify Inc. David, a user, has recently purchased a laptop computer. He is now complaining th
    14·1 answer
  • What is the Intranet?<br>​
    5·1 answer
  • Which command could you use to change to the /usr directory using a relative pathname?
    8·1 answer
  • Add my sna-p dkarpik58?...
    9·1 answer
  • Why does brainly want me to PAY or watch ads<br> i hate doing that
    9·1 answer
  • Which of the following statements is true about the code used for software development?
    7·1 answer
  • Question 7 Consider the following code:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!