1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
3 years ago
9

WIN

Computers and Technology
2 answers:
Delicious77 [7]3 years ago
6 0
The correct answer is D
astra-53 [7]3 years ago
4 0

Explanation:

b enables sound and clear tone

You might be interested in
And, or, not are examples of boolean logic
forsale [732]

true a example  boolean logic is (and, or, and  not)

-scav

8 0
3 years ago
What name is given to any changes to the original data such as users manually modifying data, programs processing and changing d
nadezda [96]

Modification is the name given to an attack that makes changes into original data such as users manually modifying data, programs processing and changing data, and equipment failures.

In modification attacks, only changes are made to original data without deleting it completely. Modification is basically a type of attack in the context of information security. This type of attack creates annoying situations and discords by altering existing data in data files, inserting new false information in the network and reconfiguring network topologies and system hardware.

Modification attack is mainly mounted against sensitive and historical data. Modification attacks target integrity of the original data with an intent of fabricating it.

You can learn more about ha-cker attack at

brainly.com/question/14366812

#SPJ4

3 0
1 year ago
Which formula is used to measure accuracy?
shepuryov [24]
<span>Gross WPM – Net WPM x 100
So B</span>
7 0
3 years ago
How does VIDEO CONFERENCE change the way we work today???
ArbitrLikvidat [17]
Well theirs less travel. Its alot easier. To work from home.

But this is what it said on a website
Most of them figure they can use conference call time to get 'real work' done, chat, read the newspaper.
7 0
3 years ago
Read 2 more answers
General Hardware Products Your boss, the IT director, wants you to explain FDDs, BPM, DFDs, and UML to a group of company manage
Bas_tet [7]

Answer:

1. FDD is a process and Analysts can use a FDD to create and use business functions and processes. It Requirements models are used when gathering requirements for a new system.

2. BPM is used on an ongoing basis for business process improvement. It is meant to improve order, insight and efficiency of the collective workflows that make up any given business process. BPM is meant to reduce any chaos within those collective workflows that make up a process and eliminate ad hoc workflow management. BPM means Business Process Management.

3. DFDs stands for Data Flow Diagram which will help software developers and designers to understand how they can take their next step to fit into the overall business process. DFDs paly key role for a successful requirements modeling.

4. UML can be used for modeling a system independent of a platform language. UML is a graphical language for visualizing, specifying, constructing, and documenting information about software-intensive systems. UML gives a standard way to write a system model, covering conceptual ideas.

Explanation:

Functional decomposition diagram (FDD) is used to identify functions and define their structure. It is a technique to decompose the complex problem into manageable pieces or individual elements to develop the application or product.

DFDs: It contains a process (shape) that represents the system to model, in this case, the "Food Ordering System". It also shows the participants who will interact with the system, called the external entities. In this example, Supplier, Kitchen, Manager and Customer are the entities who will interact with the system.

Unified Modeling Language (UML): Edraw UML Diagram is the application of choice for many software engineers and designers. The software is fully compatible with 64 and 32-bit Windows platforms from Windows XP to Windows 10.

3 0
3 years ago
Other questions:
  • What udp port is used for i k e traffic from vpn client to server?
    14·1 answer
  • What are the uses of a modem
    5·1 answer
  • When a client computer wants to connect to a service instance, what specific name type does it use to find the service?
    9·1 answer
  • Blank includes websites that encourage interaction and connection among people businesses and organizations
    14·2 answers
  • Translation of a file into a coded format that occupies less space than the original file is called
    15·1 answer
  • Which of the following statements opens the file info.txt for both input and output? a) dataFile.open("info.txt", ios::in &amp;&
    11·2 answers
  • What does a computer need from people in order to solve problems effectively?
    9·1 answer
  • What is a geam in the ggplot2 system?
    5·1 answer
  • If someone wanted to talk to a financial institution representative in person they would need to _____.
    5·1 answer
  • What is a trusted computing base (TCB)? Hosts on your network that support secure transmissions The operating system kernel and
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!