Hmmm...that is true
Here a quizlet about if you need it!
https://quizlet.com/15207805/csci-241-flash-cards/
Answer: Calendar
Explanation:
Feedback forms, text and social media integration are considered to be interactive. A feedback form is used by an individual or a organization to get a feedback on a certain topic.
A text and social media integration are also interactive as well as the sender and receiver can have an interactive session through both means.
Therefore, the correct option is a calendar as this is not Interactive.
Both waves can have interference, reflection, and diffraction.
Wave interference is a phenomenon that occurs when two waves meet while traveling along the same medium. The interference of waves causes the medium to take on a shape that results from the net effect of the two individual waves upon the particles of the medium.
Wave reflection happens when a wave reaches the boundary between one medium and another medium, a portion of the wave undergoes reflection and a portion of the wave undergoes transmission across the boundary.
Wave diffraction<span> involves a change in direction of waves as they pass through an opening or around a barrier in their path.<span> </span></span>
Answer:
writing code for a software program.
Explanation:
Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.
Some of the models used in the software development life cycle (SDLC) are; waterfall model, incremental model, spiral model, agile model, big bang model, and V-shaped model.
The five (5) standard stages of development in software development are;
I. Analysis.
II. Design.
III. Implementation (coding).
IV. Testing.
V. Maintenance.
A typical day in programming and software development would involve writing code for a software program.
Generally, software applications or programs require a code containing series of sequential instruction to perform specific tasks, commands and processes. These sets of code are typically written by a software developer (programmer).
Answer:
Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.
On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.
This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.