1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
3 years ago
8

Heeeeeeelp :) hwjkwdlfo;pk

Computers and Technology
1 answer:
Rasek [7]3 years ago
7 0

Answer: C u use schoology too :D

Explanation:

You might be interested in
Which one of the following is a functional requirement? Select one: a. None of the mentioned b. Robustness c. Maintainability d.
djyliett [7]

Answer:

The correct answer to the question is option A "None of the mentioned"

Explanation:

Functional requirements describe the component of a system by verifying the functionality of the software, defines what function a system is likely to perform. It simply dictates to the system/software on how it must behave. For example, it commands software to display, for instance, User name, total orders placed, and a lot of other commands. It puts the computer/software to describe what the product has to do.

Nonfunctional requirements describe the general quality of a system describing how it works.

In the options above, Maintainability allows modification of applications, robustness allows a system to function well even after an interruption with an error command, and Portability allows easy running and the ability for software to be transferred easily, are all examples of non-functional requirements.

.

5 0
3 years ago
When paying bills online, a payee is:
Andru [333]

The payee is the one that you send the money to. You are the payer.

Like employer the one that hires people, employee the one that is being hired


3 0
3 years ago
What is the best platform for a online meeting?
Mice21 [21]

Answer: at the moment i would pick between zoom and something by google

Explanation: Face time is not very useful as only apple users can use other things like house party and the Instagram face chat thing are not good for a professional setting. Skype has been giving me problems with the vast amount of people on it for work.

7 0
3 years ago
Read 2 more answers
Which storage device is not recommended as a permanent storage solution?
Brut [27]

Answer:

In comparison to permanent storage, non-permanent storage, also called volatile memory, is a storage device whose data is lost when its power source is disconnected. Examples of non-permanent storage include CPU cache and RAM.

Explanation:

i just know

8 0
2 years ago
With which type of social engineering attack are users asked to respond to an email or are directed to a website where they are
kirza4 [7]

Answer:

Phishing

Explanation:

Phishing is a social engineering attack where users are asked to respond to an email or are directed to a website where they are requested to login with their personal credentials, such as passwords or credit card numbers.

How Phishing Works?

The attacker first carefully designs a web page identical to a real bank with fine details. Then attacker persuades the victim to go to this fake web page with login screen. The attacker gets all the information typed and enter into that fake web page. The victim often thinks that this is exactly my bank's web page so nothing is going to happen if I put log in credentials.

How to avoid Phishing?

This kind of attack can always be spotted with one simple trick. Check the address of the web page carefully. The attacker can design the web page according to his wish but he cannot have control over the web address of a real bank or real a website.  

Some general safety tips are:

  • Don't open links from spam emails.
  • Don't download malicious software.
  • Don't share personal information with strangers
7 0
3 years ago
Other questions:
  • Question 2 (1 point)
    9·1 answer
  • In Android system, an e-mail application that shows a list of new emails, composes an email, or reads an email is called (A) Ser
    9·1 answer
  • __________ is a protocol used by e-mail clients to download e-mails to your computer.
    14·1 answer
  • Can someone please give me example of three types of loop in pascal (It has to has randomize in it too)
    15·1 answer
  • Which objects appear on the slide after she clicks OK? Check all that apply.
    13·1 answer
  • Consumer consequences for illegally downloading software
    6·1 answer
  • Another term for the plot structure of the hero journey
    13·1 answer
  • The pinky finger on the right hand types _____.
    15·2 answers
  • Noah is creating a startup. He uses the website Upwork to hire freelancers in India and in the Ukraine to work for him. This is
    8·1 answer
  • What type of hard disk is recommended for a Windows 10 VM?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!