1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
2 years ago
10

In implementing Security Life Cycle:__________

Computers and Technology
1 answer:
Dvinal [7]2 years ago
7 0

Answer:

b) one needs to follow through all phases, assessment, design, deploy and manage security

Explanation:

The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form

At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step

Therefore according to the given options, the second option is correct

You might be interested in
Is a storyboard an example of an implemation tool?
goblinko [34]
Yes, the answer is true.
8 0
3 years ago
Read 2 more answers
What type of machine is the energy of a seismic wave recorded?
Sloan [31]
<span>the answer is most likely "Seismograph"</span>
7 0
3 years ago
A game design company develops a game in which players run a grocery store and need to keep tabs on the dollar amount of goods s
sdas [7]
I do believe it is Inventory management but I can never tell if it is the right answer. so my regards if it the wrong answer.

6 0
3 years ago
If the current through a heater coil is 5 amp and the supply voltage is 120 volts, the coil resistance is
ss7ja [257]
Resistance measured in Ohms = Voltage divided by current.
120/5=24

B) 24 Ohms
7 0
3 years ago
Technology, by itself is neither good nor bad.<br> A) true<br> B) false
sukhopar [10]

Answer:

true

Explanation:

I'm pretty sure it's true. I took coding class and something similar came up, but not 100% sure tho

8 0
2 years ago
Read 2 more answers
Other questions:
  • How do solar cells translate heat energy into mechanical energy
    13·1 answer
  • Write a method so that the main() code below can be replaced by the simpler code that calls method mphandminutestomiles(). origi
    14·2 answers
  • All of the nested folders you created will carry the same permissions as the __________ until you make changes.
    10·1 answer
  • Where is the typical location of a touchpad inside of a laptop?
    13·1 answer
  • which one of the following word process feature saves you the most time when you keying in a document
    9·1 answer
  • A ____ can be used to enter, display, or edit data
    5·1 answer
  • Describe the impact of improvement ls in technology and transportation on american citizens. ​
    7·1 answer
  • It is where your cpu (processor) is installed
    10·2 answers
  • How do we Rewrite the following Python code to avoid error. mark=inpt("enter your mark ")
    6·1 answer
  • Classify computer based on signal
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!