1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
3 years ago
8

Andre is teaching a class without the software development cycle while teaching the analyst phase which task should Andre mentio

n creating flow charts​
Computers and Technology
1 answer:
Delvig [45]3 years ago
7 0

I have no idea sorry

You might be interested in
When reading data across the network (i.e. from a URL) in Python 3, what string method must be used to convert it to the interna
EastWind [94]

Answer:

decode( )

Explanation:

We can use the method decode( ) to decode the string using the codec registered for encoding.

There are two parameters

encoding: We can encode with this parameter.

errors: If used to manage the errors.

For example:

String = "this is string example....wow!!!";

String = Str.encode('base64','strict');

If we print these variables we have:

String = b'dGhpcyBpcyBzdHJpbmcgZXhhbXBsZS4uLi53b3chISE='

String = this is string example....wow!!!

7 0
3 years ago
Select the correct answer.
VladimirAG [237]

Answer:

B. cloud technology

Explanation:

There are various ways to make this possible but the best way would be using cloud technology. This would allow the entire media application to run on a server somewhere else and have the images and inputs completely streamed to and from the user's device. This allows the application to be able to run on any device that the user may have and even start on one device and transfer over to another while still having all your information and data saved and usable on each device.

6 0
3 years ago
These devices: monitor, earphone, speakers are examples of what? Input devices Storage devices Output devices All answer are cor
solmaris [256]
They are examples of Output devices.
4 0
3 years ago
Read 2 more answers
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
2 years ago
Read 2 more answers
IN EXCEL, File, menu , edit, insert are all located in ?
abruzzese [7]

Answer:

menu bar is the correct answer

hope it helps☺️

7 0
3 years ago
Other questions:
  • What aspect of the internet makes it fault-tolerant?
    6·1 answer
  • Write an essay on online collaboration, how to do it, the challenges, resolving the challenges, and consider whether the risks a
    12·1 answer
  • Which of the following is a full selector?
    12·1 answer
  • A file named data.txt contains an unknown number of lines, each consisting of a single integer. Write some code that creates two
    14·2 answers
  • This program has some errors in it that are needed to be checked import java.io.*;
    13·1 answer
  • What are some fun games to play on you phone?
    12·2 answers
  • The syntax for accessing a class (struct) member using the operator -> is ____.
    15·2 answers
  • What are the best data structures to create the following items? And why?
    13·1 answer
  • Which of the following is a programming language that permits Web site designers to run applications on the user's computer?
    15·1 answer
  • Which view in the View tab of the ribbon is the easiest place to add a header or a footer? Normal view Custom Views Page Layout
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!