1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
postnew [5]
3 years ago
6

Which is an aspect of structural-level design?

Computers and Technology
2 answers:
Oksana_A [137]3 years ago
8 0

the answer is D.) Radiosity

This is because in computers the definition of radiosity is an application of the elemental method of solving the equation for other particular scenes with surfaces that gradually reflects a  light diffusely.

hope this helps

Ludmilka [50]3 years ago
6 0

Answer:

It's C

Explanation:

plato

You might be interested in
HELP URGENT
arsen [322]

Answer:

D. It is a program that checks for grammatical errors.

5 0
2 years ago
Is the answer a,b,c,d
MariettaO [177]
Well I got some numbers mixed up but I think it’s B
4 0
3 years ago
you have been using snmp on your network for monitoring and management. you are concerned about the security of this configurati
Zinaida [17]

The thing that should be done is to implement version 3 of SNMP.

<h3>How to depict the information?</h3>

In this situation, the person has been using snmp on your network for monitoring and management. you are concerned about the security of this configuration.

Therefore, since the person is concerned about the security of this configuration, the thing that should be done is to implement version 3 of SNMP.

Learn more about configuration on:

brainly.com/question/26084288

#SPJ12

6 0
2 years ago
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
lesya692 [45]

Answer:

True

Explanation:

In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key requirements includes certification and accreditation, which is a process that occurs after the system is documented, controls tested, and risk assessment completed. It is required before going live with a major system. Once a system is certified and accredited, responsibility shifts to the owner to operate the system is a true statement.

8 0
3 years ago
A __________ note is a private note that you leave for yourself or for other people who might use the presentation file
BaLLatris [955]

Answer:

The answer is that it is a speaker note.

Explanation:

It leaves a note for people that use presentation files. I use it all the time on my google slides.

7 0
3 years ago
Other questions:
  • _____ is a method of delivering software, in which a vendor hosts the applications, and customers access these applications over
    10·1 answer
  • What microsoft operating systems started the process of authenticating using password and username
    14·1 answer
  • business owners and managers may first balk at the idea of mobile officer workers because there may appear to be a lack of ___ w
    9·1 answer
  • After which stage in the information processing cycle can data be referred for future use?
    7·1 answer
  • The product of two integers is -180 if one of them is 12 find the other​
    14·1 answer
  • Electronic mail is a
    9·1 answer
  • If 209g of ethanol are used up in a combustion process, calculator the volume of oxygen used for the combustion at stp​
    5·1 answer
  • A non-profit organization decides to use an accounting software solution designed for non-profits. The solution is hosted on a c
    11·1 answer
  • Hi, I am from India. Our brainly platform isn't so good, many of 'em keep spamming questions that I ask. US platform seems much
    9·1 answer
  • Which of the following offers a combination of the features of ram and rom?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!