I guess the answer in the blank is processes.
Activities called processes involve the microprocessor receiving commands as software carries out tasks and while input arrives from the keyboard, mouse, and other devices.
Answer:
Joint Application Development (JAD)
Explanation:
Joint Application Development is a method of application development that lay emphasis on the up-front aspect of the application development cycle whereby steady communication between the designers and the intended users of the application under development by coming together in collaborative workshop styled discussions known as JAD sessions involving the mediators, facilitator, observers, end users, experts, and developers. As such with JAD process application development result in fewer errors high quality and is completed in lesser time.
Answer:
B-malware
Explanation:
I do tech and i help work on computars.
B = x is equal to 5
and
C = “ have special meaning and should not be used when naming variables “.
Based on the above, the type of security is illustrated in this example is known as data security.
<h3>What is Data security?</h3>
This is known to be the act of keeping safe data from unauthorized access and its corruption in all of its lifecycle.
Note that in the case above, the intruder is interested in the companies data and as such, the type of security is illustrated in this example is known as data security.
Learn more about security from
brainly.com/question/15668437
#SPJ1