Answer:
Software requirement specification
Explanation:
requirement specification is the first step before proceeding with any project.
we should validate our output at all phases with software requirement specification
Frank discovers a keylogger hidden on the laptop of his company’s chief executive officer. What information security principle is the keylogger most likely designed to disrupt?
I'm guessing you mean the six external parts as in input and output devices
Here are the six external parts:
>Keyboard
>Mouse
>Monitor
>Speakers
>Printer
>Microphone or USB...I think you can choose either one as they are components outside of the computer/external/ -I/O devices
Answer:
A: Delivery receipts can be enabled for all messages, while read receipts can be turned off by the recipient.
Atleast a minimum of 3%. Brainliest?