1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga2289 [7]
3 years ago
9

………………….. is the process of causing a system variable to conform to some desired value. Options Control feedback Design none of

the above
Computers and Technology
1 answer:
frutty [35]3 years ago
4 0
Control <span>is the process of causing a system variable to conform to some desired value. Options Control feedback Design none of the above</span>
You might be interested in
The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas
Rudiy27

Answer:

True

Explanation:

Computer security is basically divided into three main areas:

  1. Vulnerability/threat assessment and risk management refers to a process that requires the identification, quantification and ranking of a system's possible vulnerabilities.
  2. network intrusion detection and incident response refers to software that detects malicious activity or policy violations, and blocks them
  3. digital forensic investigation refers to the process of identifying, recovering and interpreting (or validating) electronic data.

Generally a single individual may specialize in one of these areas, that is why he/she may need help with the others.

8 0
3 years ago
Read 2 more answers
What is the output of this program?
vladimir1956 [14]

All of the conditions of the elif statement are true. numA does equal 2 and numB does equal 3.

The output of this program is no.

3 0
3 years ago
Photographing during the midday can produce which of the following?
bija089 [108]

Answer:

great lighting

great emotion

great setting

great feeling

5 0
3 years ago
To check for consciousness:
Lesechka [4]

The answer to your question is,

D) Check their pulse.

((Well, some people say to place your ear over the persons mouth and watch for a rise and fall of the chest-- but that's not an answer nor does that really go with any of the answers provided so..))


-Mabel <3

6 0
3 years ago
Read 2 more answers
Which of the following describes an iteration in a computer program?
MakcuM [25]

Answer:

a set of instructions that can be run multiple times throughout a program

Explanation:

7 0
3 years ago
Other questions:
  • ________ is a program that runs on a computer to manage and control a computer's activities.
    11·1 answer
  • Comparing tools made of stone, iron, and bronze: place them in the correct order from least to most durable
    14·1 answer
  • Electromagnetic waves used in ovens and cell phone communications are called
    6·1 answer
  • Does anyone know how to cancel a Pandora Free Trial Subscription? I need to cancel it by tomorrow. Please help!
    12·1 answer
  • A database has a built-in capability to create, process and administer itself.
    14·1 answer
  • A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To ac
    14·2 answers
  • How does it transform your ways of socializing
    11·1 answer
  • What do I do if my friend wants me to watch a video at my house?
    8·2 answers
  • If you wanted to make the system sequentially consistent, what are the key constrains you need to impose
    6·1 answer
  • I need help about computer program. Solve C language code...... please​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!