1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jlenok [28]
3 years ago
11

1) List two hardware methods that can be used to secure data

Computers and Technology
1 answer:
kotykmax [81]3 years ago
8 0

Answer: Steps of the technological design process include: identify a problem, research the problem, generate possible solutions, select the best solution, create a model, test the model, refine and retest the model as needed, and communicate the final solution.

Explanation:

You might be interested in
Why would a store owner want to calculate a mean
chubhunter [2.5K]

Answer:

a store owner would calculate a mean to see the how much a person spends

Explanation:

4 0
3 years ago
Insert XXX to output the student's ID. public class Student { private double myGPA; private int myID; public getID) { return myI
Aleonysh [2.5K]

Answer:

Explanation:

The question above is missing many details and are actually various questions in one. I will answer each one seperately below...

A. The piece of code to get the ID in this code snippet that needs to replace XXX would be the following ... System.out.println("Student ID: " + s.getID());

B. A static main() can declare and create objects. Once these objects are created their instance methods can then be called.

C. Integer score1 = 72;

    int score2 = 85;

    Character grade = 'C';

     In the above code snippet, the information stored in score1, score2, and grade are the following... obj reference, 85, obj reference. This is becasue both Integer and Character are classes and the values being passed to their variables are referencing that object class, while score2 is a primitive type of int and is therefore simply a number.

D. The statement that is true is ... Contents of a Double instance can be modified after initialization. Objects can be modified by calling its setter methods after initializing it.

7 0
3 years ago
What is sexual intercourse <br><br>​
n200080 [17]

Answer:

immmm ....

I know the answer but I won't tell..lolllll

7 0
3 years ago
Read 2 more answers
"You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can
SSSSS [86.1K]

Answer:

6 hosts can have IP addresses on the LAN attached to the router interface

Explanation:

Given IP address

=> 192.168.192.10/29

It has a subnet mask of /29 which means it has 3 host bits. This is calculated by subtracting 29 from 32(number of bits in an IPV4)

Since there are 3 host bits,  the total number of possible addresses is given by

=> 2^{3} = 8 possible addresses.

Out of these 8 possible addresses, the first address will be the subnet id and the last address will be the broadcast address.

Therefore, there are only 6 addresses available for the hosts.

<em>Hope this helps!</em>

5 0
3 years ago
You are installing windows on a new computer. Using the RAID controller on the motherboard, you configure three hard disks in a
Sergio [31]

Answer:

On the screen where you select the disk to install Windows, click "Load Driver"

Explanation:

While the user has Windows installed on a new system. Instead, he configures several hard disks in such a RAID 5 series using the RAID controller onto the motherboard. The user is left unpartitioned and improperly formatted in the list. He edits that boot request from either the optical drive for the BIOS to boot. He installs DVD drive, begins the configuration, and boots to the disk.

Then press the "Load Driver" button on the monitor where he picks the disk to install Windows

7 0
3 years ago
Other questions:
  • If a database named Contacts has a table named tblEmployees and another database named Orders links to that tblEmployees table,
    8·1 answer
  • 13. The Save As command is useful if you want to copy an open document and
    7·2 answers
  • Lonnie has several workbooks that contain financial and sales data. He needs to ensure that if the data in a single cell in one
    5·1 answer
  • I need someone to help. This is the links I found and I'm going through the same thing. I live in small town where they think I'
    14·1 answer
  • A character with the point size of 10 is about 10/72 of once inch in height
    8·1 answer
  • Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentica
    9·1 answer
  • The birthday problem is as follows: given a group of n people in a room, what is the probability that two or more of them have t
    15·1 answer
  • High-end tools in project management software have enterprise and _____ functions that summarize and combine individual project
    9·1 answer
  • Implement a function called merge that does the following in C#:
    7·1 answer
  • How does a cell phone change the<br> incoming signals from a caller into sound that<br> you can hear
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!