1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady bird [3.3K]
3 years ago
6

A company decides to create static design diagrams for an upcoming project. Which statement correctly describes the attribute of

these types of diagrams?
A.
They describe the behavior of a system.
B.
They include sequence diagrams.
C.
They show collaborations among objects.
D.
They include component diagrams.
Computers and Technology
1 answer:
kotykmax [81]3 years ago
4 0

Answer:

A

Explanation:

You might be interested in
A personal computer can only have one operating system installed on it. true false
Pani-rosa [81]
It is true, because if you would try installing another OS after installing the first one, you would overwrite the OS which you installed before.
but in the second opinion an workstation is technically able to dual boot by installing differend operating systems on different drives. which approves that both answers can be right.
8 0
3 years ago
Jayden wants to take a current theme but just change a little bit of it. Complete the steps to help Jayden.
Georgia [21]

Answer:

Go to the  

✔ Page Layout

tab on the ribbon and the  

✔ Themes

group.

Click Themes and select one.

Go into the workbook, make the changes, and return to the Themes gallery.

Select  

✔ Save Current Theme

to save the changes.

Explanation:

yup

4 0
3 years ago
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
If you can tell me what the best part about black ops 2 is and get it right you can have the Brainliest
Maru [420]
The best part about Bo2 is the zombies, hands down. ^
4 0
4 years ago
Read 2 more answers
When using a NUMBERED list, you do not have to number each item. HTML automatically numbers each item in the order the items are
Oksi-84 [34.3K]

Answer:

hypertext markup language

Explanation:

i hope this helps, though im not sure weather your asking what HTML means, or a list of uses for HTML.

5 0
3 years ago
Other questions:
  • Which is true regarding pseudocode?
    9·2 answers
  • Business ethics are?
    9·1 answer
  • ​Case-Based Critical Thinking Questions​Case 9-1Melissa, a computer science engineering student, is learning the basics of progr
    11·1 answer
  • Attempting to determine a password that is not known to the attacker is often called ____.
    13·1 answer
  • Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office
    9·2 answers
  • ____ presents a comprehensive model for information security and is becoming the evaluation standard for the security of informa
    5·1 answer
  • The ____ object can trigger a selectedindexchanged event when a selection is made
    5·1 answer
  • According to the video, what types of education are useful for Database Administrators? Check all that apply.
    5·2 answers
  • 25 points select 3 options!!!!!!!!!!!!!!!!!!!!!!!!!
    8·1 answer
  • What is the half of 3/18
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!