1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masha68 [24]
3 years ago
6

Which of the following is considered information?

Computers and Technology
2 answers:
Vitek1552 [10]3 years ago
4 0
I think it would be B or C
inna [77]3 years ago
3 0

i believe the answer would be b, if i gave the correct answer, please mark brainliest and if you have any more questions lmk x

You might be interested in
DEF is a small consulting firm with ten on-site employees and 10 to 12 part-time (off-site) software consultants. Currently, the
kherson [118]

Answer:

What i would suggest for the organization is to use the Testing Infrastructure strategy. it is good for your consulting firm because it is less costly and provide security.

Explanation:

Solution

There are different network security strategy which is listed below:

Segment the network:

Segmentation in network is very useful for providing security.If any threat is occur only one segment is effected remaining are safe and it is less cost process. very useful for small organizations.

Test your infrastructure :

Testing infrastructure also very good technique.

Always we have to test our infrastructure whether threat is occur or not.

If any threat is happen we can detect that easily by testing our infrastructure.

Regularly update anti-virus software :

This is very useful for small organizations and it is less cost.with less cost we can provide security for all devices like computer,server,modems etc.

Frequently backup your critical data :

This is very good technique for crucial data.If we backup important data any time that will be useful if any attack is happen.

This is less costs and simple.

Change router default security settings :

Changing router password and settings also helpful for providing security.If we maintain same password and same settings for a long time that may lead to data hacking.It is cost less process very useful for small organizations.

6 0
3 years ago
In the context of the planning phase of the systems development life cycle (SDLC), which is an example of an internally identifi
erma4kov [3.2K]

Answer:

The correct option to the following question is D.).

Explanation:

SDLC stands for the System Development Life Cycle.

The aim of the SDLC is to produce the high quality of the software that exceeds or meets the reaches completions and customers' expectations with costs and time expectations.

Software Development Life Cycle is the frameworks that defining the task performed at each of the steps in software development process.

8 0
3 years ago
Match the IT role to the best description:
Bad White [126]

1. Use many of the same skills and technologies as Web application developers to create applications for devices such as smartphones and tablets - Mobile Application Developers

2. Websites designed specifically for mobile device browsers - Web Architects

3. Applications created specifically for mobile operating systems, such as Google Android or Apple iOS - Mobile Apps

4. They consult with the management team and Website users to design and implement the plan for developing and maintaining the organization's Website - Interface Designer  

5. use Web programming languages or products to develop Websites, generally for Web server applications - Web Application Developers  

<u>Explanation:</u>

The definitions and its terms are self explanatory. A <em>mobile application developer</em> will develop applications for mobiles and other gadgets.

<em>Mobile Websites</em> can be accessed only from browsers of mobile.

<em>Android or iOS</em> are the operating system designed for Mobile.

Interface designers develop designs for websites.

<em>Web app developers</em> develop websites using web programming languages.

7 0
3 years ago
HAVING A REALLY BAD DAY PLEASE HELP
iragen [17]

For each of your computers:

- You will want internet connectivity

- Perhaps share a printer

- Share files (pictures, music, documents etc.) between computers

- Create backups

- Play multiplayer games

All these purposes justify a home network.

6 0
3 years ago
A device which is not connected to the cpu is known as?​
Dvinal [7]

Answer:

would be called an Off-line device

3 0
3 years ago
Other questions:
  • The _____ command icon looks like a small clipboard with a page attached.
    6·1 answer
  • A firewall, when properly implemented, can prevent most attacks on your system.
    11·1 answer
  • The component that allows you to make a paper-based copy of a body of text is the _____.
    12·1 answer
  • Sorry to bother you guys but for some reason it wont let me comment. How can i fix this?
    5·2 answers
  • Complete the do-while loop to output every number form 0 to countLimit using printVal. Assume the user will only input a positiv
    9·1 answer
  • Which value can be entered to cause the following code segment to display the message: "That number is acceptable." int number;
    11·1 answer
  • During project management, who executes tasks and produces the deliverables as stated in the project plan and as directed by the
    9·1 answer
  • The following program is supposed to display a message indicating if the integer entered by the user is even or odd. What is wro
    13·1 answer
  • Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number for which a
    8·1 answer
  • Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!