1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Neko [114]
3 years ago
8

Identify the effective editing strategy.

Computers and Technology
2 answers:
Rudiy273 years ago
6 0
D.using a checklist......
max2010maxim [7]3 years ago
6 0

D using a checklist is a great and effective editing stradegy.

You might be interested in
What view and zoom setting do you need for true WYSIWYG display? Why?
gayaneshka [121]
I'm not sure. Can you be more specific?
7 0
4 years ago
Lập trình web truy vấn csdl và hienr thị ra màn hình danh sách các bản ghi
almond37 [142]

Answer:

ExplanatOverfishing occurs "when more fish are caught than the population can replace through natural reproduction," according to the World Wildlife . Once this occurs, the species is no longer "sustainable." Eighty-seven percent of all the world's fish stocks that we know about are at the "breaking point," according to the Environmental Defense Fund (EDF).

ion:

3 0
3 years ago
A list that is not sorted by numbers is called a?
Feliz [49]

Answer:

An unordered list(HTML)

6 0
4 years ago
I
Naily [24]

Answer:

True

Explanation:

Not(False) OR False = True OR False = True

4 0
3 years ago
Role based access control
Phantasy [73]

Answer:

Is better in situation in which we want to assign the rights not to the people, but to the specific job

Explanation:

<u>Definition</u>

In an organization  to assigned the role in the network access based with in organization we RBAC.

Its model consists of

  1. users
  2. roles
  3. permissions
  4. sessions

Therefore, we can say that, <em>RBAC is better in situation in which we want to assign the rights not to the people, but to the specific job</em>

8 0
4 years ago
Other questions:
  • Aubrey didnt like to use graphics or images on her slides. She preferred to use only a title for her slides and bullet-poinged t
    14·2 answers
  • An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect t
    8·1 answer
  • When you reach a YIELD sign, yield to cross traffic and ____ before you enter the intersection.
    14·2 answers
  • Atari licensed a game from taito that became a smash-hit and helped sell the vcs/2600. what is the name of that game?
    14·2 answers
  • You are using a wireless client adapter with a site survey utility and a notebook computer to perform a manual site survey in a
    7·1 answer
  • Describe the functions of ALU, resisters, CU, BIU, Cache and FPU.
    7·1 answer
  • With a chart , illustrate the stage of wood processing plsss help I will mark u as brainliest plss help pls and I will follow yo
    15·1 answer
  • Transitive spread refers to the effect of the original things transmitted to the associate things through the material, energy o
    6·1 answer
  • Imagine that your parents were starting a small business, and they wanted to upgrade their data storage. Would you recommend a f
    11·1 answer
  • Explain any two types of board band connection​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!