1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julia-pushkina [17]
3 years ago
8

Need the answer ASAP!!!!!!!!!!!!! I’ll mark brainliest if correct

Computers and Technology
1 answer:
Dmitriy789 [7]3 years ago
6 0

Answer: review; quality

Explanation:

SQA refers to the ongoing process that can be found in the Software Development Life Cycle whereby the developed software is checked in order to ensure that the desired quality measures are met. The SQA processes is vital as it checks for the quality in every development phase.

The first step of the SQA process is to (review) the software development process. The next step is to set (quality) attributes.

You might be interested in
U2- an example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
Ivan
The answer is "masquerade".
4 0
3 years ago
The parts of a memo are _____.
Alex
The correct answer would be D
4 0
4 years ago
Read 2 more answers
Enter just the letter of the correct answer
Viefleur [7K]

Answer:

C. WDS

Explanation:

DND is for rolling dice and arguing about alignments

WiFi Analyzer just monitors your WiFi's stats and health

--> WDS lets you wirelessly connect two routers for larger range

DHCP is for IP address distribution.

3 0
3 years ago
What is returned by the code: range (20, 100, 30) ?
Hunter-Best [27]
Answer : (20, 50, 80)





4 0
3 years ago
How do you protect the server from modification by non-root users?
Elis [28]

Answer:

We can protect the server from the modification by using the non root users in many ways as follows:

  • By modifying the PHP settings in the server and by using the configured file as, the configuration of the file is basically depend upon the linux and the PHP script.
  • By disabling the URL from the function of file handling that basically accept the local file as the parameters but it also accept the URL.  It can even now get to outer destinations by utilizing fsockopen or any of the CURL capacities.
  • The safe mode  of PHP is presumably probably the best alternative to secure your server however it very well may be prohibitive. Whenever initiated, experimental mode averts access to records not claimed by Apache and access to condition factors and execution of double projects are likewise debilitated.

4 0
3 years ago
Other questions:
  • PLEASE HELP ASAP!!!!
    14·1 answer
  • Erick, who is taking an online course, sent an e-mail to his
    14·2 answers
  • If you have long column labels with columns so wide that they affect the readability of a worksheet you should first
    6·2 answers
  • which type of classroom enable students to attend lectures without being physically present with the teacher
    14·2 answers
  • Which option will automatically update copied data?
    12·2 answers
  • Aubrey is on a Windows machine. She wants to back up her Halloween pictures on an external hard drive. Which of the following ta
    12·1 answer
  • Which of the following are examples of software? (Select all that apply)
    9·2 answers
  • Tech A says that gasoline vapors are lighter than air, so inspection pits do not have a fire hazard like above ground hoists. Te
    9·1 answer
  • Work-based learning can be defined as educational experiences that focus on
    6·1 answer
  • What is the bandwidth for asymmetric digital subscriber line<br> (ADSL)?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!