1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mafiozo [28]
3 years ago
11

Question #2

Computers and Technology
1 answer:
stiks02 [169]3 years ago
4 0

Answer:

Step 1: define task

Step 2: process

Step 3: input

Step 4: output

Step 5: check accuracy

Explanation:

Took the test.

You might be interested in
Android OS "AFTER" Beta.<br><br> A. Cupcake<br><br> B. Candy<br><br> C. Cookie<br><br> D. Carmel
Sonbull [250]
Cupcake was third release of Android original operating system. Came out in 2009 and is no longer supported
3 0
3 years ago
An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans f
klio [65]

Answer:

The main problem with such a tool would be resource usage

Explanation:

The main problem with such a tool would be resource usage. Such a tool would need a large amount of CPU power in order to check all of the files on the system thoroughly and at a fast enough speed to finish the process before the next cycle starts. Such a program would also have to allocate a large amount of hard drive space since it would need to temporarily save the original versions of these files in order to compare the current file to the original version and determine whether it changed or not. Depending the amount of files in the system the work on configuring the program may be very extensive since each individual file needs to be analyzed to determine whether or not they need to be verified by the program or not. Monitoring responses may not be so time consuming since the program should only warn about changes that have occurred which may be only 10% of the files on a daily basis or less.

8 0
3 years ago
Hello can someone help with the output of this please?
Gelneren [198K]

Answer:

its a diamond shape

Explanation:

i did it on desmos please give brainliest please and good luck :)

8 0
2 years ago
Be able to list a technology-based company and discuss whether it enjoys sustainable competitive advantage based on the resource
aev [14]

Answer:

idk good luck finding one

5 0
3 years ago
A(n)______is a database object used to customiz
Blizzard [7]

Answer:

option B report is the right answer

4 0
3 years ago
Other questions:
  • A ____ is a structure that allows repeated execution of a block of statements.
    13·2 answers
  • Give a logical expression with variables p,q, and r that is true if p and q are false and r is true and is otherwise false.
    5·1 answer
  • you'll be organizing the various databases in your organization, and have recommended hiring a/an?A. internet specialist B. comp
    6·2 answers
  • We need ____ pointers to build a linked list.
    6·1 answer
  • We wish to design a decoder, with three inputs, x, y, z, and eight active high outputs, labeled 0, 1, 2, 3, 4, 5, 6, 7. There is
    5·1 answer
  • Computer hardware without software is usless and compyrersoftware without hardware is meaningless discuss
    6·1 answer
  • Would a sim card(activated) be able to function on any phone regardless of the companies carrier?
    7·1 answer
  • Develop an algorithm to print the names of the candidates who should receive a refund. A refund is due if the candidate's votes
    7·1 answer
  • Wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww!
    7·1 answer
  • Select the correct answer.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!