1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fed [463]
3 years ago
12

A _____ refers to a product or service, such as a technical report, a training session, a piece of hardware, or a segment of sof

tware code, produced or provided as part of a project.
Computers and Technology
2 answers:
Tju [1.3M]3 years ago
8 0

Answer:

deliverable

Explanation:

Based on the information provided within the question it can be said that the term being described in the question is known as deliverable. Like mentioned , this term refers to a specific good or service that is produced as project with the intention of being delivered to a client that has ordered that specific product or service.

horsena [70]3 years ago
7 0

Answer:

The correct answer is letter "A": deliverable.

Explanation:

Deliverables is a project management concept that defines an object or service to be delivered or completed by a certain due date. Deliverables can be tangible or intangible. These include reports, graphic designs, computer system updates, analytics and everything else that helps a larger project lead to completion.

You might be interested in
Which two tasks are associated with router hardening? (choose two.)?
nexus9112 [7]

Disabling unused ports and interfaces.

Securing administrative access.

Router hardening means that the router is secured against attacks as best as possible. Router hardening is one among the three areas of router security that must be maintained to secure an edge router at the network perimeter. Basically, router hardening secures from tough-to-crack passwords, to the shutting down of unnecessary interfaces, ports, and services. Look for any unused router interfaces and disable them by issuing the shutdown command. Disabling unused services typically include BOOTP, CDP, FTP, TFTP, PAD, and a few others. You can also disable administrative and management protocols currently not being  like HTTP or HTTPS, DNS, and SNMP.

8 0
3 years ago
12. Good digital citizenship includes keeping in mind who has access to the internet and who does not. (1 point)
Veseljchak [2.6K]
True | <span>Good digital citizenship includes keeping in mind who has access to the internet and who does not, as there are situations in which people or business assume there is always an internet connection but it is not always like that. Forr example, in a contact card it could be useful to include a phone number, as someone may not having access to mail.
</span>
Google Glasses® | <span>Google Glasses® was a technology developed by Google, which included the portability of the Google technology on a glass lens. However, the project failed, and the glasses have not made the huge breakout expected. There is a new version in elaboration now that seems to be more promising. </span>
6 0
3 years ago
Read 2 more answers
When should you save your document?
Verdich [7]

Answer:

b. when you have completed a document

4 0
3 years ago
Read 2 more answers
What were the names of Henry VIII's six wives?
timurjin [86]

Answer:

Jane Seymour,Anne Boleyn,Katherine of Aragon,Anne of Cleves,Katherine Howard,Katherine Parr

Explanation:

7 0
2 years ago
Read 2 more answers
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
3 years ago
Other questions:
  • Which functions are performed by server-side code??​
    10·1 answer
  • Please help me please and thank you!
    14·1 answer
  • When introducing new devices to the network, the organization's security policy requires that devices be monitored to establish
    15·1 answer
  • If anybody knows what does this mean I will answer any questions for you and plz answer this right plz what does that envelope w
    5·2 answers
  • Which word goes with "meals
    5·2 answers
  • A ____ object is used to hold data that is retrieved from a database via the OleDbDataAdapter connection. a. DataRecord b. DataS
    12·2 answers
  • 2. Who created the first photograph? How was this done?
    14·2 answers
  • The process of identifying and removing logical errors and runtime errors is called ..............
    5·2 answers
  • Mississippi law codes state that bullying and cyberbullying are against the law. A court can decide to incur ___________________
    10·1 answer
  • Under what scenarios can we clear the NVRAM by moving the PSWD jumper to the RTCRST<br> pins?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!