1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vichka [17]
3 years ago
9

Classify the various scenarios in a web development team that is creating a website for a client according to the priority level

in PDD.
The client needs a content and design outline within two weeks.
The client suggests that a suitable logo be incorporated on the homepage.
The client suggests an optional feature of news feeds.
high level
low level
medium level

Computers and Technology
1 answer:
Nataly [62]3 years ago
3 0

Answer:

este seria de nivel bajo - El cliente sugiere que se incorpore un logotipo adecuado en la página de inicio

este seria de nivel medio - El cliente necesita un esquema de contenido y diseño en dos semanas.

este seria de nivel alto - El cliente sugiere una característica opcional de las fuentes de noticias.

Explanation:

Espero te sirva!!

You might be interested in
An Inspect and Adapt (I&A) event is occurring and a program is trying to address a long-existing problem (WIP)?"unreliable P
ASHA 777 [7]

The aspect Of the program that causes uncontrollable amounts of work in process is that Teams do not do a good job of task switching.

<h3>What is task switching?</h3>

Task switching or task interleaving is known to often take place if a task is voluntarily or involuntarily stopped so as to listen  to another task.

In the case above, The aspect Of the program that causes uncontrollable amounts of work in process is that Teams do not do a good job of task switching.

Learn more about task switching from

brainly.com/question/12977989

#SPJ1

7 0
2 years ago
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
Write 10 steps to make your presentation more effective
Over [174]
For me the some steps I use not 10 steps sorry are I always go through the slide and think what I am talking about. You have to understand what you are talking about and be clear and persuasive. Never look at the presentation. Memorize key phrases and keep your eyes at your audience. make each of your slides colorful so viewers will look at your actually slide.
4 0
3 years ago
What is NOT powered by the PSU of your computer?
Yuliya22 [10]
Peripherals like your monitor or your printer.
3 0
3 years ago
CPT (Current Procedural Terminology) codes consist of 3-4 numbers representing a unique service. True False
xz_007 [3.2K]
This is in fact false to my knowledge
4 0
3 years ago
Other questions:
  • I have a bag of trail mix.half of the bag contains peanuts.1/4of the bag is chocolates candies, and 1/4of the bag is dried fruit
    12·2 answers
  • Which expresses 6y : 9y in its simplest form?
    12·1 answer
  • Blank spaces or unseen control characters in a data file are referred to as
    5·2 answers
  • Whoever understands this first and replies will be the brainliest.<br><br><br><br> Road work ahead?
    9·2 answers
  • Setting the isShowing property to false of the opacity property to o will delete an object from an Alice world.
    15·2 answers
  • To add text to a blank slide layout, _____.
    14·1 answer
  • HELP !!! Prompt <br> What is formatting text?
    7·2 answers
  • Explain the function of different flags in the 8086<br>​
    12·1 answer
  • PLEASE HELP ME ASAP!!! Looking at the misty rain and fog (pictured above) Explain at least two defensive driving techniques you
    15·1 answer
  • Pa sagot po TLE-10<br>need den po Ng solution thank you​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!