1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leni [432]
3 years ago
12

Which three items might appear on the project plan when discussing an upcoming website with a design team? (Choose three)

Computers and Technology
1 answer:
stepladder [879]3 years ago
5 0
Planning and analysis, due dates and payment details .
You might be interested in
Access your Practice Lab titles Access your exercise content Reports and files Access your settings Access help and support Comp
Degger [83]

Answer:

The extension for a shell script in windows ends with a .ps1 and for the extension for linux it is .sh, not quite sure for OSX.

4 0
3 years ago
You are most likely to use<br> images for photos or digital paintings.
Lubov Fominskaja [6]

Answer: Digital Paintings

7 0
3 years ago
Someone once observed that "the difference between roles and groups is that a user can shift into and out of roles, whereas that
mestny [16]

Answer:

All things considered newgrp has nothing to do with security jobs.  

newgrp sets the procedures bunch id which is in many frameworks are irrelevant. All gatherings are accessible. Gatherings are characterized as assortment of clients , bunch get to is conceded to documents dependent on the record gathering.  

Regularly (setgroups/getgroups ) all gatherings are in the process get to list.  

The authorization at a document or registry level has a 3 level arrangement of consents, for example, client proprietorship , bunch possession and others. All things considered the document authorization are a mix of read , compose and execute .we need both peruse and execute consent to run a program.  

A procedure may get to the document if a record has a place with the user(the proprietor of the document ) or if the gathering identifier coordinate on the gatherings in the clients bunches list. That entrance is constrained by the relating consents signals on the record.  

Gatherings have been over-burden with some "job" definitions. In any case, these are just over-burden and not a decent utilization of groups,the utilization of a gathering as a job was bolstered by the setgroup id banner , and by utilities like a sudo , where gathering name likewise coordinates a security control. It expect that the gathering name isn't utilized for documents yet once a client is in the gathering that client can apply the gathering to a record regardless of whether it isn't what the gathering was for.  

This over-burden use worked where frameworks didn't bolster genuine jobs. The over-burden utilize was only a work around.  

Linux has genuine job definition bolstered by SELinux models and can be applied to documents , clients , and forms.

7 0
4 years ago
What is the "key" to a Caesar Cipher that someone needs to know (or discover) to decrypt the message? a) A secret word only know
Tpy6a [65]

Answer:

The number of characters to shift each letter in the alphabet.

Explanation:

Caeser Cipher is the technique of encryption of data, to make it secure by adding characters between alphabets. These are the special characters that make the message secure while transmitting.

According to the standards, For Decryption, we remove these special characters between alphabets to make message understandable.

<em>So, we can say that,to de-crypt the message, the number of characters to shift each letter in the alphabet.</em>

3 0
3 years ago
The __________ method can determine whether a string contains a value that can be converted to a specific data type before it is
luda_lava [24]

Answer:

tryparse method

Explanation:

You can convert a string to a number by calling the TryParse method found on various numeric types (int, long, double, etc.), or by using methods in the System.Convert class.

8 0
3 years ago
Other questions:
  • What is the main benefit of seeing your document in Page Break Preview?
    9·2 answers
  • An op amp requires the design equation vout = 50vin 3vref agvg. what is the value of ag?
    7·1 answer
  • What should htc's os strategy be? should it stick with windows mobile and android? should htc build its own platform? add/drop o
    6·1 answer
  • Explain in details three security countermeasures you know.​
    10·1 answer
  • Which of the following is a separate summary worksheet in the same workbook?
    14·1 answer
  • What does the revolver do?
    10·1 answer
  • Subjective Questions
    11·1 answer
  • A two-dimensional array has been defined to hold the quantity of each of 5 different healthy snack products sold in a tuckshop d
    10·1 answer
  • The action displayed in the status bar while pointing-
    7·1 answer
  • What are the differences and similarities of computer virus and biological virus. Give 4 examples
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!