1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastova [34]
3 years ago
13

A plan that outlines the steps and timeline for reaching a certain goal is called a(n):

Computers and Technology
1 answer:
kap26 [50]3 years ago
5 0
I think it is an action plan.
You might be interested in
Password procedures, information encryption software, and firewalls are examples of measures taken to address:
Gnoma [55]
<span>Password procedures, information encryption software, and firewalls are examples of measures taken to address are all measures taken to safeguard information security and protect users data from being tampered or manipulated by invaders. 

In web, if we leave our information without encryption or if we leave our system without firewall, different types of security threats might arise: such as, information being hacked, manipulated or sent to wrong places. To avoid this information encryption is done. We might also need to firewall our system so that we can avoid unwanted access and invading of our privacy using malwares and other tools. </span>
5 0
3 years ago
Thanks for help evreybody
ladessa [460]

Answer:

np

Explanation:

7 0
3 years ago
Read 2 more answers
How does collaborating on a project improve its quality?
Serga [27]
Several different collaborations on a project introduce variety, perspective and give the people working together communication skills for business in the future.
7 0
3 years ago
2. You turn on your Windows 7 computer and see the system display POST messages. Then
Anton [14]
The monitor would definitely be the problem in this scenario.
7 0
3 years ago
Which tab provides commands for the most commonly used elements in Word Software?
Flauer [41]
I think it should be in the design tab
6 0
3 years ago
Other questions:
  • Being tired has very similar effects on the body as what
    7·1 answer
  • During an investigation of a cybercrime, the law enforcement officers came across a computer that had the hard drive encrypted.
    5·1 answer
  • What kinds of messages can computers read? (CodeHS)
    7·1 answer
  • Sarah is entering weekly sales data for week 37 of the current year; however, when she moves down to thecells where she needs to
    8·2 answers
  • 1. Why is it important to compare features of a computer before making a purchase?
    13·2 answers
  • What are some (free) good animation websites (for PC/Microsoft) for a short informational video about homelessness?
    15·1 answer
  • To speed up item insertion and deletion in a data set, use ____.
    12·1 answer
  • Thank you very much for your email. ...... was very interesting​
    15·1 answer
  • The protocol that enables computers on the Internet to communicate with one another is called ___
    8·2 answers
  • Describe, with examples, the way in which a defect in software can cause harm to a person, to the environment, or to a company
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!