1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
3 years ago
5

I WILL GIVE THE CROWN IF CORRECT

Computers and Technology
2 answers:
alisha [4.7K]3 years ago
7 0

Answer:

foundations

Explanation:

Oliga [24]3 years ago
6 0

Answer:

foundation

Explanation:

You might be interested in
What is the job title of someone who works with video and/or film?
boyakko [2]
Producer, videographer
4 0
3 years ago
Which of the following is a geolocation service on an Internet browser?
seropon [69]
It may be D) because it is actually a simplified version of Google maps.
7 0
3 years ago
Read 2 more answers
A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also
bekas [8.4K]

Answer:

The security principle being referred to here is:

Resource Encapsulation.

Explanation:

Resource Encapsulation is one of the cybersecurity first principles.  It allows access or manipulation of the class data as intended by the designer. The cybersecurity first principles are the basic or foundational propositions that define the qualities of a system that can contribute to cybersecurity.  Other cybersecurity first principles, which are applied during system design, include domain separation, process isolation, modularization, abstraction, least principle, layering, data hiding, simplicity, and minimization.

7 0
3 years ago
When working with a large worksheet, you can split the window into ____ panes.?
krek1111 [17]
When working with a large worksheet, you can split the window into two or four panes.
5 0
3 years ago
Which statement will add a string to the string pool?
Alecsey [184]

Answer:

string newstring="hello"

7 0
2 years ago
Other questions:
  • Brian is testing a banking application. He enters an input and expects a certain output. What is the actual output of the applic
    11·1 answer
  • Which key do programmers use to end running programs?
    14·2 answers
  • True / False<br> 1. A byte is a standardized unit of measure that is always 8-bits.
    7·1 answer
  • The domain in an email message tells you the
    8·1 answer
  • To remove an embedded chart, you should _____ it and press the DELETE key. (Points : 2) move drag hide click
    15·1 answer
  • 8.11 LAB: Count characters - functions Write a program whose input is a character and a string, and whose output indicates the n
    6·1 answer
  • What is the name of the option in most presentation applications with which you can modify slide elements?
    7·2 answers
  • Identify what algorithm or concept the following code relates to. void Sort(int array[], int tempArray[], int left, int right) {
    6·1 answer
  • An instruction for the computer. Many commands put together to
    5·1 answer
  • A Network Intrusion Detection System watches for potentially malicious traffic and _______ when it detects an attack.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!