1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marrrta [24]
2 years ago
8

Which are factors that go into a project plan?

Computers and Technology
1 answer:
BaLLatris [955]2 years ago
5 0

Answer:

The four critical factors to planning a successful project

Explanation:

You might be interested in
Add my sna-p dkarpik58?...
BARSIC [14]

<u><em>This is for answers not snap</em></u>

7 0
3 years ago
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
Anni [7]

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

6 0
2 years ago
Which of the following is the component of the processor that directs and coordinates most of the operations in the computer?A.
drek231 [11]

Answer:

C. control unit.

Explanation:

A processor is a miniaturized central processing unit a in digital system that interconnects and controls the activities of other components in the device.

The components of a microprocessor are the bus, registers, cache memory, arithmetic and logical unit and the central or control unit.

The bus is the transportation medium for all activities in the processor. The registers like the accumulator and the B register are memory locations used to hold the operand of an operation.The cache memory holds data meant for immediate use by the processor. Arithmetic and logical unit carries out the various arithmetic and logical operation in the processor, while the control unit is responsible for handling or managing all activities in the processor.

5 0
3 years ago
Which is true regarding pseudocode?
bearhunter [10]

Answer:

It uses simple words and symbols to communicate the design of a program

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language. Also, a pseudocode gives a summary of the steps adopted during a software development process using simple (concise) words and symbols.

This ultimately implies that, a pseudocode uses simple words and symbols to communicate the design of a program.

8 0
2 years ago
Read 2 more answers
Displays information a bout drivers, network connections, and other program-related details.
slava [35]

Answer:

library

Explanation:

hope you like it

6 0
3 years ago
Other questions:
  • would specify that only selected members of the payroll and human resources department would have the right to change sensitive
    11·1 answer
  • What is the use of word art?
    10·1 answer
  • Explain how to identify a starting position on a line.
    15·2 answers
  • By applying styles, _______ formats are being applied each time. A. various B. different C. the same D. similar
    6·2 answers
  • WILL GIVE BRAINLIEST!!
    12·1 answer
  • When was internet started in which year​
    13·2 answers
  • A USB device used to transfer photos from the memory card to a hard drive is called a _____.
    5·2 answers
  • I need help, whoever gets it correct will get brainliest
    7·1 answer
  • Which of the following is input devices? (a)Scanner (b) Keyboard (c) Both a and b (d) Plotter​
    5·1 answer
  • Compare the graphs. Find the value of h, k, or a.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!