1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Georgia [21]
3 years ago
12

Type the correct answer in the box. Spell all words correctly.

Computers and Technology
2 answers:
choli [55]3 years ago
7 0

Answer:

design documents

Explanation:

Usually, in a software development company or information technology (IT) department, software is developed through a team effort. Such teams have programmers and various other professionals, such as software developers and engineers. These professionals perform parts of the entire software development process. For example, the programmer is not the only person in a team who can formulate a solution to a problem. Many times, software developers and system analysts do this. They create design documents for the programmer to follow. Based on these design documents, a programmer writes the code for the program.

3241004551 [841]3 years ago
6 0

Explanation:

Only for study

Or open Meet and enter this code: bqa-ivfs-ach

You might be interested in
Note oj cyber security​
dybincka [34]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

                               "cyber security"

cyber security refers to the body of technologies,Processes and practices designed to protect networks,devices,programs and data from attack,damage or unauthorized  access.Cyber security may also be referred to as information technology security.

Importance:

                         Cyber security is important because government financial and medical organization collect process and store unprecedented amounts of data on computer and other devices.A significant portion of that data can be sensitive information,whether that be intellectual property financial data personal information or other type of data for which unauthorized access or exposure could have negative consequences.organizations transmit sensitive data across network and to other devices in the course of doing business,and cyber security describes the discipline dedicated to protecting that information and the systems  use to process or store it.

Challenges of cyber security:

                  For an effective cyber security an organization needs to coordinates its effort throughout its entire information systems.Elements of cyber components all the following:

  • Network security
  • Application security
  • Endpoint security
  • Data security
  • Identity management
  • Database and infrastructure security
  • cloud security
  • Mobile security

Managing cyber security:

            The national cyber security alliance,through recommends a top down  approach to cyber security in which corporate management leads the change in prioritizing cyber security management across all business practices. NCSA advises that companies must be prepaid to response to the inevitable cyber incident restore normal operations,and ensure that company assets and the company reputation are protected.

7 0
3 years ago
How can earn more answer from brainly less than two minutes, please
Andrei [34K]
You have to answer other people’s questions.
6 0
3 years ago
Identify the equation that translates Y = In(x) five units down.​
Tatiana [17]
Y=In(x)-5
hopefully it’s right :)
4 0
2 years ago
Will Give Brainliest!
liraira [26]

You have to wait a little bit until you can give the person brainiest. You mostly give it to someone who gave a great answer. :)

7 0
3 years ago
Read 2 more answers
All websites with medical information should be considered credible.
larisa [96]
No, this is not true. WebMD is a great example asking you of simple symptoms that you may be facing and your results could present an apparent fatal disease. This constantly scares the population of netizens whenever they would want a quick diagnosis online through these medical information sites. The best solution to your symptoms is to visit your family doctor or a licensed physician who will give you proper diagnosis checking your vital signs and other related information. Do not always trust the internet and the information it gives you as a user you must take the information with discretion before reacting inappropriately. 
3 0
2 years ago
Read 2 more answers
Other questions:
  • Which technology enables afloat forces to communicate more securely and to operate in a more dispersed manner?
    6·1 answer
  • Write a program that displays in the title of the window the position of the mouse as the user moves the mouse around the window
    5·1 answer
  • What statement best decribes the relashionship bewteen science and technoligy?
    11·2 answers
  • Lenovo's ThinkPad laptop computers is designed in the United States, the case, keyboard, and hard drive are made in Thailand; th
    14·1 answer
  • The Internet acts as a(n) blank services such as The World Wide Web and email
    6·2 answers
  • Examine the following algorithm.
    9·1 answer
  • ساعدوني على الإجابة على هذه الأسئلة
    11·1 answer
  • A programmer wants to determine whether a score is within 10 points of a given target. For example, if the target is 50, then th
    11·1 answer
  • Which of the following is not considered essential for an electronic device to be called a computer?
    15·1 answer
  • Is a device used to test the network connection.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!