1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
3 years ago
5

Ideation includes all of the following EXCEPT

Computers and Technology
1 answer:
chubhunter [2.5K]3 years ago
5 0

i believe it would be either C or D im sorry i dont know the exact answer

You might be interested in
The PRNG variable ___________ is defined in NIST SP 800-90 as a number associated with the amount of work required to break a cr
Kamila [148]

Answer:

Strength

Explanation:

A huge number of systems use a process called Pseudo Random Number Generation (PRNG). In NIST SP 800-90, The PRNG has a set of parameters that define various variables within the algorithm. The PRNG variable strength is defined in NIST SP 800-90 as a number associated with the amount of work required to break a cryptographic algorithm or system.

3 0
4 years ago
Important tools used in the _____ phase of the DMAIC process include a project charter, a description of customer requirements,
pishuonlain [190]

Answer:

d. define

Explanation:

DMAIC is an acronym for Define, Measure, Analyze, Improve and Control is a data-driven improvement cycle used for improving processes and driving Six Sigma projects.

Important tools used in the define phase of the Define, Measure, Analyze, Improve, and Control (DMAIC) process include;

- A project charter.

- A description of customer requirements.

- Process maps.

- Voice of the Customer (VOC) data.

5 0
3 years ago
The OSI model is currently the most widely implemented network model used to develop and build networks of any size, including t
natta225 [31]

Answer:

The correct answer to the following question will be "False".

Explanation:

  • The Open Systems Interconnection model is a conceptualization that describes and vastly simplifies a telecommunication or computer system's communication features, regardless of its inner structure and technologies underlying them.
  • This model aims is to direct manufacturers and creators so that they would modularize with the digital communication devices and computer programs they build, and to promote a consistent context that defines the roles of a network or telecom device.

Therefore, the given statement is false.

7 0
3 years ago
Select the steps for adding artwork into a placeholder on a presentation slide
Sloan [31]

Answer:

   Open the presentation that you want to add a slide to.

   In the pane that contains the Outline and Slides tabs, click Slides, and then click where you want to add a slide.

Explanation:

6 0
4 years ago
A(n) _______ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packet
malfutka [58]

Answer:

DoS or Denial of Service

Explanation:

Have a nice day! :)

3 0
3 years ago
Other questions:
  • ________ computers are specially designed computer chips that reside inside other devices, such as a car. Select one: A. Tablet
    11·2 answers
  • What did Fulton design in addition to the steamboat
    5·1 answer
  • Implement a program to measure the impact of application-level buffer sizes on read time. This involves writing to and reading f
    13·1 answer
  • What are two examples of ways an electronic record may be distributed to others?
    15·1 answer
  • When changing the formatting of a spreadsheet to make it more readable, you should use light blue text on a bright blue backgrou
    12·1 answer
  • What is one of the first power tools you’ll need as electrician
    15·1 answer
  • Both the Alphabetic Index and the Tabular List must be used to locate and assign a diagnosis code in ICD-10-CM. Group of answer
    7·1 answer
  • How was the Big Ben project similar to the investigation you conducted in class to determine if the table was vibrating? How is
    7·1 answer
  • In high-tech fields, industry standards rarely change.<br> True <br> False
    14·1 answer
  • Which of the following declares an abstract method in an abstract Java class?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!