1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
3 years ago
9

Power point presentation make use of pages known as

Computers and Technology
2 answers:
Stolb23 [73]3 years ago
7 0
Slides, I think that is the correct answer
inna [77]3 years ago
3 0

Power point presentation make use of pagers know as

You might be interested in
Gunther is filling in his own input mask. He wants to format the Social Security numbers of his clients. The field must contain
a_sh-v [17]
Last one I am not sure they
3 0
3 years ago
The implementation stage of the SDLC is when the system is moved into operation where it can be used. What stage PRECEDES the im
antiseptic1488 [7]

The stage that precedes the implementation stage of SDLC is <u>testing</u> and it involves checking the functionality of the system.

System design involves the process of determining an overall system architecture, which typically comprises the following:

  • Hardware.
  • End users.
  • Physical processing components.
  • Software.
  • Communication channel.

Generally, there are seven (7) main stages in the systems development life cycle (SDLC) model and these include:

1. Planning.

2. Analysis.

3. Design.

4. Development.

5. Testing.

6. Implementation.

7. Maintenance.

From the above, we can deduce that the stage which precedes the implementation stage of SDLC is testing.

During the testing stage of SDLC, a quality assurance (QA) expert checks the system to determine whether or not it is functioning properly before it is deployed for operation, which is where the system can be used.

Read more: brainly.com/question/20813142

7 0
3 years ago
Describe two ways methods that cab be used to help stop hacking
mojhsa [17]

Answer:

Use a firewall

Install antivirus software.

Explanation:

7 0
2 years ago
Who is the intended audience of a pseudocode document?
cluponka [151]

Answer and Example:

Pseudocode is an artificial and informal language that helps programmers develop algorithms.

Pseudocode is a "text-based" detail (algorithmic) design tool. The rules of Pseudocode are reasonably straightforward. All statements showing "dependency" are to be indented.

Pseudocode is understood by the programmers of all types. it enables the programmer to concentrate only on the algorithm part of the code development.

Java would use this.

3 0
3 years ago
In terms of technolagy, soft wear is defined as
tia_tia [17]

Answer:

the programs and other operating information used by a computer.

Explanation:

4 0
3 years ago
Other questions:
  • To illustrate a point in a Word document with a simple chart, what command should you select
    6·2 answers
  • How can you tell if a hacker has administrative access?
    15·2 answers
  • Photo editing can transform any image into a great photograph.
    9·1 answer
  • In many cases, a subquery can be restated as a/an ______________.
    13·1 answer
  • In what year was google launched on the web?
    14·1 answer
  • Two technicians are discussing bleeding air from the brake hydraulic system. Technician A says to depress the brake pedal slowly
    10·1 answer
  • A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user
    10·1 answer
  • Write a program that removes all non-alpha characters from the given input. Ex: If the input is: -Hello, 1 world$! the output is
    13·1 answer
  • Withdrawal from a conflict is best used when ______.
    6·2 answers
  • FIRST ANSWER GETS BRAINLIEST IM GIVING 30 POINTS!!!! Select the correct answer. Emma's project team has to create an application
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!