1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lapo4ka [179]
3 years ago
12

Drag each tile to the correct box.

Computers and Technology
1 answer:
Likurg_2 [28]3 years ago
4 0
Learning
planning
designing
developing
testing delivering
You might be interested in
When a defendant pleads guilty to one offense just to have another offense dropped, this is what type of plea bargain
uranmaximum [27]
<h2>Answer:</h2>

The answer is sentenced plea bargain

<h2>Explanation:</h2>

sentence bargaining occurs when a defendant agrees to plead guilty to the stated charge in return for a lighter sentence. Typically this must be reviewed by a judge, and many jurisdictions simply don't allow it. In sentence bargaining, they plead guilty agreeing in advance what sentence will be given; however, this sentence can still be denied by the judge.

4 0
3 years ago
Read 2 more answers
A(n) ____________ is a program that translates a high-level language program into a separate machine language program.
Cerrena [4.2K]
A compiler is the program.
5 0
3 years ago
What are some of the ways you can use bitlocker encryption? (choose all that apply?
nasty-shy [4]
Bitlocker Encryption can be used during the process of authenticating your computer with a TPM, during the process of authenticating your account with a USB flash drive, and most of the authentication through text messages.
3 0
3 years ago
What can be designed to create annoying glitches or destroy data
Katen [24]

I guess the best answer is Virus.

Virus is a malicious computer program that is designed to create annoying glitches or destroy data.

3 0
3 years ago
Read 2 more answers
To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl
Zolol [24]

Answer: False

Explanation:

 The given statement is false, as the configuration of the firewall, operational and administration procedure must be documented.

The configuration of multiple firewall are identical and the integrity and also performance of the configuration firewall files are check on the regularly bases.

It is basically used to avoid the security leaks and the documentation errors so it is necessary that it should be check regularly so that it can easily implement without any interrupt occurrence.

8 0
3 years ago
Other questions:
  • A/An ___ is a series of instructions or commands that computer follows used to create software
    10·2 answers
  • Which are malicious codes? <br><br> JavaScript <br> Key loggers <br> Scrum <br> Spyware <br> Worms
    12·1 answer
  • Want is the assignmment
    8·1 answer
  • Every time you are asked to work with others, you are being asked to:
    6·2 answers
  • PLEASE HELP, True or False: The term whitespace speaks to the design of a website
    8·2 answers
  • How to wire two separate switches &amp; lights using the same power source?
    14·1 answer
  • URGENT HELPP<br> WILL MARK BRAINLIST
    6·1 answer
  • Edhesive in JAVA Write a method that takes a String parameter. If the String has a double letter (i.e. contains the same letter
    13·1 answer
  • Who plays oblox .............................
    8·2 answers
  • What is the binary conversion of 179.187.223.21?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!