1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
12

Please help will give brainliest

Computers and Technology
1 answer:
ludmilkaskok [199]3 years ago
5 0

Answer:

waterfall- google search

Explanation:

You might be interested in
How can I convert a string to a int? in Java
Deffense [45]

Answer:

int

Explanation:

5 0
2 years ago
You have been tasked with ensuring that access to certain server managed resources is only available to client devices with TPM
elixir [45]

Answer:

Device Health Attestation Services

Explanation:

Based on the scenario being described it can be said that the Windows Server role that can be used to automate this check is known as Device Health Attestation Services. This is a role that allows the administrator to automatically check if a device has the required trustworthy BIOS, TPM, or boot software enabled, as well as Bitlocker encryption.

7 0
3 years ago
A restaurant owner wants to use a database to help his business. What would be a good thing for him to do first?
arsen [322]
C Ask himself what his purposes will be for using a database. You have to figure out the basics first
5 0
3 years ago
Read 2 more answers
Which key serves as both toggle and manipulative key
bogdanovich [222]

Answer:

wheres the picture?

Explanation:

I need a picture 2 answer

7 0
3 years ago
Read 2 more answers
The Harrison Group Life Insurance company computes annual policy premiums based on the age the customer turns in the current cal
valina [46]

Answer:

yea that is correct hope this works

7 0
3 years ago
Other questions:
  • 5. In Access, data is stored in a _______ once a form is completed. A. cell B. page C. record D. form
    13·1 answer
  • Assume that the population of Mexico is 114 million and that the population increases 1.01 percent annually. Assume that the pop
    9·1 answer
  • Machine-to-machine (M2M) technology enables sensor-embedded products to share reliable real-time data ________.Select one:a. ove
    14·1 answer
  • For which of the following is a bulleted list more appropriate than a numbered list?
    6·1 answer
  • A reflexive pronoun is a pronoun
    6·1 answer
  • (1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term e
    10·1 answer
  • Create a program that calculates the tip and total for a meal at a restaurant. Type the code into an IDLE IDE editor window and
    5·1 answer
  • Group of programs are software ​
    6·2 answers
  • Outside of a C program, a file is identified by its ________while inside a C program, a file is identified by a(n) ________. fil
    13·1 answer
  • You need to install a 32-bit application on a 32-bit version of windows 10. In which default directory will the application be i
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!