1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ostrovityanka [42]
3 years ago
9

Which statement describes the word "iterative"?

Computers and Technology
1 answer:
erica [24]3 years ago
5 0
Relating to or involving iteration, especially of a mathematical or computational process.
You might be interested in
Imagine you are responsible for making a presentation that includes a representation of the logic flow through a process. You un
svetoff [14.1K]

Answer:

find reliable resources

Explanation:

if you find reliable resources, than you might able to have more help i know im not answering..but im trynna help

3 0
2 years ago
Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and ins
Murljashka [212]

Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack.

<h3>What is downgrade security attack?</h3>

A downgrade attack is known  to be a kind of of cyber attack that is made up of the fact that an attacker is known to often forces a network channel to make a switch to a kind of an unprotected or one that is said to be less secure data transmission standard.

Note also that the  Downgrading of a given protocol version is said to be a key element of  a type of a  man-in-the-middle attacks, and it is known to be one that is often used to take or hijack encrypted traffic.

Hence, Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack

Learn more about Downgrade attack from

brainly.com/question/24304791

#SPJ1

3 0
1 year ago
Different organizations implement different Information Systems base on their core business operations. explain
Mashutka [201]

Answer:

Different business or firm tend to enforce different Information Systems based completely on their main business operations, in order to best leverage data as an organizations asset. Some of these Information System are as follow:

a) Transaction Processing System (TPS):

A small organization tends to process transactions that might result from day-to-day activities, such as purchase orders, creation of paychecks and thus require using TPS.

b) Management Information System(MIS):

Managers and owners of small organizations tend to incline towards industry-specific MIS, in order to get historical and current operational data, such as inventories data and sales.

c) Decision Support System (DSS):

A DSS to allow managers and owners of small organizations to use predefined report in order to support problem-resolution decisions and operations planning.

7 0
3 years ago
Which of the following is used to store the memory address for variable a into pointer
weqwewe [10]
Hence D is your answer
5 0
2 years ago
What are the benefits of a relationship in RDBMS <br>​
natali 33 [55]

Answer:

To sum up all the advantages of using the relational database over any other type of database, a relational database helps in maintaining the data integrity, data accuracy, reduces data redundancy to minimum or zero, data scalability, data flexibility and facilitates makes it easy to implement security methods.

Explanation:

I hope it helps you..

Just correct me if I'm wrong..

4 0
2 years ago
Other questions:
  • Binary search requires that data to search be in order. true or false
    5·1 answer
  • For each entity, select the attribute that could be the unique identifier of each entity.
    12·1 answer
  • What in the LAN for a small office, some user devices connect to the LAN using a cable, while others connect using wireless tech
    14·1 answer
  • A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.
    9·1 answer
  • Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corr
    7·1 answer
  • What error occurs in the following program? #include using namespace std; int main() { int number1, number2, sum; cout &lt;&lt;
    13·1 answer
  • Yo, my Lenovo laptop keeps showing this screen but I can't sign in, can someone help me?
    5·2 answers
  • WIRELESS DATA TRANSMISSION METHODS​
    8·1 answer
  • What is required to become a good critical thinker? Use a process when dealing with a big issue. Practice the right skills over
    9·1 answer
  • What would be printed to the screen when the following program is run?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!