1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zubka84 [21]
3 years ago
6

...This is totally a question

Computers and Technology
1 answer:
kramer3 years ago
6 0

Answer: No Answer

Explanation: No Explanation

You might be interested in
The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system.
navik [9.2K]

Answer:

False

Explanation:

The Security Development Life Cycle (SDLC), is a software development which involves traditional approach towards its design such as, waterfall model, Agile, etc.

It can either be referred to as a generic secure development life cycle or a specific one, such as the Microsoft SDL or the Cisco SDL.

Its phases includes,

A1 - Security Assessment

A2 - Architecture

A3 - Design and Development 1

A4 - Design and Development 2

A5 - Ship

PRSA - Post Release

Each phase talks about how a secured software is developed.

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. This statement is false because by definition and attributes Security Development Life Cycle is a traditional approach towards software development and not a general method.

6 0
3 years ago
Which of the following technologies can operate in the 125 kHz to 134 kHz range?
Sophie [7]

Technologies that can operate in the 125 kHz to 134 kHz range is the

B. RFID

Explanation:

  • RFID is technology which works on radio frequency and it is used for the auto-identification for the different object.
  • The RFID system mainly consists of two parts. In this RFID system, this RFID reader continuously sends radio waves of a particular frequency
  • RFID is the use of radio waves to read and capture information stored on a tag attached to an object, providing a unique identifier for an object.
  • Active RFID tags have a transmitter and their own power source. Instead, they draw power from the reader, which sends out electromagnetic waves that induce a current in the tag's antenna.
  • Semi-passive tags use a battery to run the chip's circuitry, but communicate by drawing power from the reader.
  • Radio frequency identification (RFID) can operate in three frequency bands: 125 kHz to 134 kHz, 13.56 MHz, or 856 MHz to 960 MHz. Bluetooth is 2.4 GHz; NFC is 13.56 MHz; and LTE is between 600 MHz and 6 GHz.
7 0
3 years ago
Your company has a team of remote workers that need to use Windows-based software to develop company applications, but your team
timofeeve [1]

Operating systems are the software that supports the basic functioning of the computer. Windows Virtual Desktop is an Azure compute service that will help solve the problem.

<h3>What is Windows Virtual Desktop?</h3>

Windows Virtual Desktop is an app virtualization service of Azure that operates on the cloud platform. It includes standard operating procedures that can be used by users with multiple OS.

Azure's Virtual Desktop supports different versions of window OS. This type of system is majorly used in remote work demands and specialized workloads.

Therefore, Windows Virtual Desktop is an Azure compute service.

Learn more about Azures service here:

brainly.com/question/13144160

#SPJ1

5 0
2 years ago
This type of server spools documents and puts them in a queue.
Paraphin [41]

Print is the type of server that spools documents and puts them in a queue. Whenever you are printing multiple documents, it is the standard operation of the printer to prioritize those documents that came first and add to the queue the other documents waiting for printing.

4 0
3 years ago
Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message
Lynna [10]

Answer:

I think that part A is correct option

6 0
4 years ago
Other questions:
  • How many buttons does a gamecube controller have?
    7·1 answer
  • A mother calls you to report that her 15-year-old daughter has run away from home. She has access to her daughter's e-mail accou
    6·2 answers
  • Ayudaa, 5 ejes de sistemas tecnológicos
    5·1 answer
  • FREE 100 POINTS + FIRTS AWNSER = BRAINIST
    8·2 answers
  • Ask the user to input a number less than 100. Print all the numbers from that number to 100.
    6·2 answers
  • Which specialized information system is used by passport agencies and border inspection agencies to check the names
    13·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • Which of the following items in the folder window allows users to view locations which have been visited before?
    6·1 answer
  • What is a personal data?
    12·1 answer
  • missy just hired a software development team to create an educational simulation app for a high school course. she has specific
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!