1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kruka [31]
3 years ago
8

During which step does the designer set their goals

Computers and Technology
1 answer:
Anton [14]3 years ago
3 0

brainstorming

~hope i helped

01

You might be interested in
What can we do to positive interaction online?
Julli [10]

Answer:

We can help eachother out with things.

Explanation:

Eg. Schoolwork and homework because our stress level will decrease.

8 0
3 years ago
Read 2 more answers
I need help with the rest also
dalvyx [7]

Answer:

??? blackkkkkkkkkkkkkkkkk

6 0
3 years ago
To insert a new field in a table, the ____ keyword should be used with the alter table command
fenix001 [56]
It seems that you have missed the necessary options for us to answer this question so I had to look for it. Anyway here is the answer. To insert a new field in a table, the ADD <span>keyword should be used with the alter table command. Hope this answers your question.</span>
5 0
3 years ago
When creating an access list statement, the wildcard mask 0.0.0.0 can be substituted by what word?
weqwewe [10]

Answer:

host (?)

Explanation:

6 0
3 years ago
What technology uses mathematical algorithms to render information unreadable to those lacking the required key
hoa [83]

Data encryption is the name of the technology that uses mathematical algorithms to render information unreadable to those lacking the required key.

<h3>What is Data encryption technology?</h3>

This is a technology that helps to secure data by applying a technique known as cryptography. What this basically means is that a secret code (or key) is generated which would provide access to the cryptographically stored information, and failure to provide the correct key makes the data or information unreadable.

You can learn more about how data encryption works here brainly.com/question/9238983

#SPJ1

6 0
2 years ago
Other questions:
  • PLS HELP!! 50 Points! Will mark correct answer brainliest!!
    11·2 answers
  • Which style of leadership would be most helpful to Charles in the following situation? Charles has just started an internship at
    15·1 answer
  • What is infinite recursion?
    7·1 answer
  • What are youth oraganizations?
    7·1 answer
  • कम्प्यूटर में एक समस्या को ठीक करने के लिए एक कार्यक्रम या कोनफीगरेशन परिवर्तन के बाद किए जाते हैं
    5·1 answer
  • Write a Python program segment, using a loop, to calculate and print the sum of the odd integers from 20 to 120. (Hint: 21 23 25
    13·1 answer
  • A slide titled Alexander Graham Bell. There are 6 bulleted entries on the slide, and there is a lot of text on the slide. There
    11·2 answers
  • What are the functions of super computer?<br> ​
    7·2 answers
  • I need help with these
    8·1 answer
  • the human resources department requests a list that contains the number (i.e. count) of orders taken on each date, grouped by th
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!