1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jlenok [28]
3 years ago
11

1) List two hardware methods that can be used to secure data

Computers and Technology
1 answer:
kotykmax [81]3 years ago
8 0

Answer: Steps of the technological design process include: identify a problem, research the problem, generate possible solutions, select the best solution, create a model, test the model, refine and retest the model as needed, and communicate the final solution.

Explanation:

You might be interested in
Which attitudes are most common among successful IT professionals?
Bess [88]

Answer:

understanding the problem very well

writing documention to every piece of code you write

write clear and concise code

follow Industry accepted format for data storage

avoid recursion if possible

write modular code

5 0
4 years ago
Real life example of hexadecimal and octal decimal “for example in binary light switch”
umka2103 [35]

Answer:

No results found for Real life example of hexadecimal and octal decimal “for example in binary light switch”.

Explanation:

gm

7 0
2 years ago
What Is one reason that more personal computers have windows operating systems as opposed to Mac operating systems
erma4kov [3.2K]

if you search up how windows is better that mac this comes up

"99% of these users will prefer a PC to a Mac because it's the right platform for their needs. Final Cut Pro users use Macs. It doesn't run on Windows.... ... Extreme enthusiasts prefer PCs because they can run better hardware in a PC than they can get in a Mac."

all you have to do is put it in your own words :)

8 0
3 years ago
Read 2 more answers
What would be the results if the Formula =2*C8+3*D9 is entered into a cell if the value displayed in C8 is 3,and the value in ce
larisa [96]

Answer:

The correct answer is:

12 (c)

Explanation:

The codes as shown C8 and D9 represent cells in an Excel spreadsheet. the cell tags describe the column letter and row numbers. For instance; C8 means the 8th row in Column C, while D9 means; the 9th row in column D. In order to do mathematical functions with Excel, the formulae starting with an equal sign (=) like the one shown in this example are used. The function is solved as follows:

= 2*C8+3*D9

where:  

* = multiplication sign (×)

C8 = 3

D9 = 2

∴ 2*C8+3*D9 = (2 × 3) + (3 × 2)

= 6 + 6 = 12

∴ the result is 12

6 0
3 years ago
What are preconceptions?
anastassius [24]
An idea or statement  that you had previously or earlier.

6 0
4 years ago
Read 2 more answers
Other questions:
  • A stack queue can be implemented as a circular array stack dynamic linked list dynamic vector none of these
    5·1 answer
  • What allows files containing text, programs, graphics, numerical data and so on to be downloaded off or uploaded onto a network?
    13·1 answer
  • Discuss why it is common for XML to be used in interchanging data over the Internet. What are the advantages of using XML in dat
    7·1 answer
  • Quienes son el proyectista y el director de obra en una ICT
    6·1 answer
  • Which of these tax forms reports an employee's yearly social security tax withheld
    11·2 answers
  • Why is biodiversity so important to ecosystems?
    6·1 answer
  • ? Question<br> How are the Internet and the World Wide Web different from each other?
    11·1 answer
  • The BIOS performs most of the calculations, which enable a computer to function and is sometimes referred to as the “brain” of t
    8·1 answer
  • What does c++ programming mean?
    7·1 answer
  • Operational level management can be supported by the systems except Select one: 01. Transaction Processing System 2. Manufacturi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!