1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stira [4]
2 years ago
14

Factors to consider while selecting a software to use​

Computers and Technology
1 answer:
luda_lava [24]2 years ago
6 0
You need to consider what exactly you will be using the software for, there are many different softwares and they all have different purposes.
You might be interested in
How many passes will it take to find the four in this list?
earnstyle [38]

Answer:

3 is the correct answer

I got correct on my test

7 0
3 years ago
Read 2 more answers
1. If you have the following device like a laptop, PC and mobile phone. Choose one device
ella [17]

Answer:

For this i will use my own PC.

OS - Windows 10

Storage Capacity - 512 GBs

Memory - 16 GB

Wi-Fi - Ethernet

Installed Application - FireFox

Explanation:

An OS is the interface your computer uses.

Storage capacity is the space of your hard drive.

Memory is how much RAM (Random Access Memory) you have

Wi-Fi connectivity is for how your computer connects the the internet.

An installed application is any installed application on your computer.

3 0
3 years ago
8.7 Code Practice Question 3
lorasvet [3.4K]

I included my code in the picture below.

8 0
3 years ago
Read 2 more answers
(e) The vending machine stores the quantity of items available in a database table called ITEMS
zimovet [89]

Answer:

a1,a2,62,

please mark brainliest

Explanation:

8 0
2 years ago
Authorized agent Confidentiality Integrity Encryption 6:53 PM ______ means that only people with the right permission can access
mojhsa [17]

Answer:

The answer is "Confidentiality"

Explanation:

Confidentiality alludes to shielding data from being gotten to by unapproved parties. All in all, solitary the individuals who are approved to do so can access delicate information. Imagine your bank records, You ought to have the option to get to them obviously, and representatives at the bank who are assisting you with an exchange ought to have the option to get to them, yet nobody else ought to. An inability to keep up Confidentiality implies that somebody who shouldn't have access has figured out how to get it, through deliberate act or coincidentally. Such a disappointment of Confidentiality, normally known as a breach  can't be helped. When the secret has been uncovered, it is highly unlikely to un-uncover it.

Assuming your bank records are posted on a public site, everybody can realize your bank account number, balance, and so forth, and that data can't be eradicated from their brains, papers, PCs, and different spots. Virtually all the significant security occurrences reported in the media today include loss of Confidentiality.

Thus, in summary, a breach of Confidentiality implies that somebody accesses data who shouldn't be permitted to.

6 0
2 years ago
Other questions:
  • Given a int variable named yesCount and another int variable named noCount and an int variable named response write the necessar
    6·1 answer
  • Convert the following pseudocode to C++ code. Be sure to define the appropriate variables. Store 25 in the speed variable. Store
    5·1 answer
  • Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its
    8·2 answers
  • On the Format tab, which group allows you to select a different font for a chart?
    7·2 answers
  • What font family is Times New Roman an what font family is Arial?
    9·2 answers
  • A. All methods in an interface must be _________________ _________________________.
    5·1 answer
  • ________________, _______________ and ___________ are what you see when you open Excel
    14·2 answers
  • A central issue of public sharing is:
    13·2 answers
  • 9.18 lab: even/odd values in a vector write a program that reads a list of integers, and outputs whether the list contains all e
    5·1 answer
  • System development life cycle
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!