Makes it personalised to you. If you don’t want people to use your excel work , putting your name on it or the person it belongs to’s name can make sure that it belongs to you or who it is meant to belong to.
Answer: 2)Fishbone/lshikawa
Explanation: Fishbone diagrams are those diagrams which help in the identification of the problem causing factors and reasons behind.This diagrams find the roots of the problem to solve it. Fishbone diagram is also known as the Ishikawa diagram.
The other given options are incorrect because they are not any technique for finding the roots of the problem.Thus, the correct option is option(2).
Answer:
requirements
Explanation:
<h2><u>
Fill in the blanks</u> </h2>
A <u>requirements</u> document identifies the purpose of the program being developed, the application title, the procedures to be followed when using the program, any equations and calculations required, any conditions within the program that must be tested, and any notes and restrictions that must be followed by the program.
Answer:
Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.
Answer:
Taskbar or they are pinned to desktop
Explanation: