1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fredd [130]
3 years ago
11

Based on your research and understanding, write a 3- to 4-page Microsoft Word document that:

Computers and Technology
1 answer:
Over [174]3 years ago
3 0

Answer:

....

Explanation:

You might be interested in
Create a cell reference in a formula by typing in the cell name or
il63 [147K]

Answer:

D. Clicking the cell

Explanation:

Clicking the target cell is an alternative way of typing in the cell name when creating a cell reference in a formula.

Hope this helps!

8 0
3 years ago
Read 2 more answers
If you were an attacker who wanted to gain access to a network, would you focus on breaching technical controls for applying soc
katrin2010 [14]

Answer:

Baiting. As its name implies, baiting attacks use a false promise to pique a victim's greed or curiosity. ...

Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. ...

Pretexting. Here an attacker obtains information through a series of cleverly crafted lies. ...

Phishing. ...

Spear phishing

Explanation:

thank me later

7 0
3 years ago
Difference between system and software development life cycle
umka2103 [35]

Answer:

Software development life cycle is about building a software (“only”) in a phased approach systematically.

System development life cycle is about implementing hardware and software in a phased manner systematically.

Explanation:

Here both the hardware and the software is considered as a system.

Hope this helps!

3 0
3 years ago
A company's prospectus includes:
mash [69]

Answer:

C)The company's revenue and net worth.

6 0
2 years ago
Why when i want to answer a profile that starts with a will put a link to "https://bitly.com/"
vodomira [7]
I don’t know i checked it and i think it’s a virus or something like that don’t click on link
6 0
2 years ago
Other questions:
  • Wi-Fi is designed for medium-range transfers, up to ____ feet outdoors. Answer 100 300 500 900
    13·1 answer
  • Match each career to its various job roles. digital media coordinator digital media specialist photographer sound producer creat
    13·1 answer
  • Bradley is working on a program that uses different classes in specific relationships. Help him remember what these relationship
    14·1 answer
  • Question is in photo
    11·1 answer
  • ProgrammingAssignment3
    8·1 answer
  • What is the difference between autofocus and autocomplete
    8·1 answer
  • Chris is working with other employees on a worksheet. the other employees have made comments, but they are not visible.
    11·1 answer
  • What is a program that includes a function parameter capable of doing?
    8·1 answer
  • The technique that allows you to have multiple logical lans operating on the same physical equipment is known as a.
    6·1 answer
  • The field that uses technology to manipulate and use information to improve healthcare is known as:_______
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!