1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solmaris [256]
3 years ago
9

It is a blueprint of a project​

Computers and Technology
2 answers:
lbvjy [14]3 years ago
6 0

Answer:

oh good but where is that blue print

Marizza181 [45]3 years ago
4 0
Where is the blueprint? I cant see it
You might be interested in
You want to drive traffic to a new landing page for a campaign, and want a web address that's short, easy to remember, trackable
Akimi4 [234]

Hootsuite supports you with vanity URLs.

1. vanity URLs

<u>Explanation:</u>

Since the website webpage is landing on campaign, heavy network traffic is expected. Better to have multiple URL methods but it will not solve the purpose of heavy of network access of webpage or web site. Better to use vanity URLS methods to use heavy network traffic.

Vanity URLS means is customizable redirecting or rerouting by branding links or customized URL link. These type of vanity URLS by choosing hosting service and customize link been created. So end user can use link.

6 0
3 years ago
What objective behaves like a high level array
zavuch27 [327]

Answer:

C.Vector

Explanation:

Vector is a high level array used in C++.It has the capability of resizing itself when it gets full.it has many functions that increases it's functionality like size(),begin(),end(),erase(),clear(),push_back(),pop_back() and many more and we store any kind of data type in the vector.

syntax for declaring a vector:-

vector<data type> vector name.

8 0
3 years ago
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
A team is building an application that must persist and index JSON files in a highly-available data store. Latency of data acces
Vsevolod [243]

Answer:

DynamoDB is the correct answer of this question.

Explanation:

DynamoDB is a completely controlled NoSQL server website that allows server tables to be generated that can store and recover any amount of information.DynamoDB is an Amazon Web Services server platform that promotes software architectures and web resources priced by key.

DynamoDB can accommodate over 10 billions requests in a day, and therefore can sustain peaks of over 20 million queries per second.

5 0
4 years ago
8.2 code practice edhesive
Helga [31]

Answer:

temperatures = []

i = 0

while i < 5:

   try:

       t = int(input('Enter a temperature: '))

       temperatures.append(t)

       i += 1

   except ValueError:

       print('Enter a number')

print(temperatures)

Explanation:

Hope this helps!

3 0
3 years ago
Other questions:
  • What basic drafting instruments are incorporated in a drafting machine?
    12·1 answer
  • Which line(s) immediately flush the output buffer?
    8·1 answer
  • Choose the web design factor from the drop-down menus that best represents each statement. A. Good web pages stick to the point,
    15·1 answer
  • Which of the following is not a compilation error? Group of answer choices a. Placing a semicolon at the end of the first line o
    13·1 answer
  • अस्स्मन्चचरे ------------------- दृश्यते |
    8·1 answer
  • You are given a 11-bit floating point representation with 1-sign bit, 3 bits for the exponent, and 7-bits for the mantissa. Expr
    9·1 answer
  • (asking again because point-hogs exist)
    11·1 answer
  • An employee sets up an automation that transfers files in a specific folder on their PC to a remote drive for archiving, provide
    11·1 answer
  • Why are Quick Parts useful in an Outlook message?
    5·1 answer
  • Five technology tools and their uses​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!