1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
3 years ago
9

If the task is to write firewall specifications for the preparation of a(n) __________, the planner would note that the delivera

ble is a specification document suitable for distribution to vendors.
Computers and Technology
1 answer:
USPshnik [31]3 years ago
3 0

Answer:

RFP

Explanation:

If the task is to write firewall specifications for the preparation of a(n)<u> RFP</u> , the planner would note that the deliverable is a specification document suitable for distribution to vendors.

RFP means request for proposal.

You might be interested in
If someone has the IP address 127.0.0.1 and tries to connect to the address 127.255.252.255, which are they attempting to connec
sertanlavr [38]
B is the answer i think
6 0
3 years ago
_________ is the biggest problem you can face if you don’t identify the scope of your risk management project. Scope creep Nonco
mart [117]

Answer: Scope creep

Explanation:

 Scope creep in the project management basically refers to the uncontrolled development or growth in the project creep. It basically occur when the project scope are not appropriately defined.

It usually involve lack of change in the control system and increase the complexity of the project. It is also has poor requirement analysis.

So, that is why it is the biggest problem we usually face in the project management.

5 0
3 years ago
As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taki
solong [7]

Answer:

Option(B) i.e., social engineering  is the correct option to the question.

Explanation:

The following option is correct because social engineering is the type of attack in which the criminals tricks the computer users to disclose the confidential data or information. Criminals or hackers use this trick because by this they can easily take advantage of your confidential information or corporate secrets.

4 0
3 years ago
Commands under menu bar in a computer
Brilliant_brown [7]

Answer:

File, Edit, and View

Explanation:

These are the standard ones that come with the software.

3 0
3 years ago
Indica las ventajas del sistema biela manivela.
leva [86]

Answer:

El atributo más importante de una manivela de rendimiento del mercado de accesorios es que a menudo tiene más trazo, por lo que puede crear un paquete de stroker y así agregar más pulgadas cúbicas en el motor. Otra ventaja es tener una versión que no está disponible de otra manera, como una manivela 360 (3,58 pulgadas de carrera) con una pequeña red (tamaño 318/340).

5 0
3 years ago
Other questions:
  • According to your textbook, which of the following is a consequence of the quick development of new technologies in the digital
    8·1 answer
  • 14. What is the simplest way to permanently get rid of an unwanted file?
    9·1 answer
  • In the RGB model, which color is formed by combining the constituent colors?
    14·2 answers
  • When working in the middle of a presentation, how do you preview the slide show from the current slide?
    12·1 answer
  • Given four inputs: a, b, c &amp; d, where (a, b) represents a 2-bit unsigned binary number X; and (c, d) represents a 2-bit unsi
    6·1 answer
  • Can you tell me what is rast
    5·1 answer
  • Write a function in Java to implement the following logic:
    13·1 answer
  • Some Tiny College staff employees are information technology (IT) personnel.
    8·1 answer
  • Rachelle is writing a program that needs to calculate the cube root of a number. She is not sure how to write the code for that
    10·2 answers
  • Top/Bottom Rules allow a user to apply conditional formatting to cells that fall within the top or bottom numbers or percentile.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!