Answer:
Satyajit Ray (1921–1992), a Bengali film director from India, is well known for his contributions to Bengali literature. He created two of the most famous characters in Feluda the sleuth, and Professor Shonku the scientist. He wrote several short novels and stories in addition to those based on these two characters. His fiction was targeted mainly at younger readers (mostly teenagers) , though it became popular among children and adults alike.

Ray during recording of his film Pather Panchali
Most of his novels and stories in Bengali have been published by Ananda Publishers, Kolkata; and most of his screenplays have been published in Bengali in the literary journal Ekshan, edited by his close friend Nirmalya Acharya. During the mid-1990s, Ray's film essays and an anthology of short stories were also published in the West. Many of the stories have been translated into English and published.
Answer:
IP address.
Explanation:
An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.
Hence, 69.147.76.15 is an example of an IP address.
In Computer networking, IP address are classified into two (2) main categories and these are;
1. Local (internal) IP address.
2. Global (external) IP address.
Generally, when this IP address such as 69.147.76.15 is translated by a domain name system (DNS), it is mapped to the domain name yahoo.com which is much more understandable or comprehensible to the end users.
You could turn off memory testing, but defragmentating and running chkdsk on C: would be better to try first.
Answer: Requirements phase
Explanation:Requirement phase in the SDL(secure development life-cycle) is the phase where the security is fused with integrity part for any product. This mechanism is done to know about the requirement of the product in the security field. This is done to achieve the completeness in the product and to recover the mistakes that had happened earlier in the product due to security issues.
Other phase given in the option are for making the code, designing the model of product and testing the products aspects respectively.
It is mostly used to store and retrieve information