1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
postnew [5]
3 years ago
13

Davingould1115...................answer 1​

Computers and Technology
2 answers:
erma4kov [3.2K]3 years ago
8 0

wt ...

I didn't get u..

is it a I'd

bezimeni [28]3 years ago
6 0

Answer:thx bro

Explanation:

You might be interested in
Roark has just joined a company and in his role as a lead analyst, he will be responsible for determining which systems developm
hram777 [196]

Answer:

Agile/adaptive methods.

Explanation:

The user has just decided to join a firm and will also be accountable to determine whether that system development technique that group uses to establish the latest software for a significant medical distributor to his position as just a lead analyst.

After that, he consumes a week for the purpose to understand his group members for reason to know their strengths and weakness and how would they work under pressure.

So, the following method is required for him to understand about the disadvantages of each of them.

4 0
3 years ago
What type of encryption is currently used to secure wpa2?
MaRussiya [10]
AES (Advanced Encryption standard) is currently used to secure wpa2.
3 0
3 years ago
Which of the following are features of the HTTPS protocol?
gavmur [86]

Answer:

All traffic is encrypted. No one on your network can see what is going on (except for knowing where those packets are going to).

The identity of the remote server can be verified using certificates. So you also know that it really is your bank that you are talking to.

Optionally (and not in wide-spread use), the identity of the client can also be verified using certificates. This would allow for secure login to a site using chip cards instead of (or in addition to) password

8 0
3 years ago
Thomas is getting ready for a presentation. His slides are set, and he's
PIT_PIT [208]
B copy the web page of the video that you want to use
5 0
4 years ago
Research jobs in digital media. Using a job-posting site like Indeed, Monster, Career Builder, or other sites, search for a job
Alborosie

Answer:

Research jobs in digital media. Using a job-posting site like Indeed, Monster, Career Builder, or other sites, search for a job in your area. Once you identify a job in digital media that you may want to do, research the qualifications and education needed to perform this job, Write a paper of at least 300 words that includes:

Explanation:

Research jobs in digital media. Using a job-posting site like Indeed, Monster, Career Builder, or other sites, search for a job in your area. Once you identify a job in digital media that you may want to do, research the qualifications and education needed to perform this job, Write a paper of at least 300 words that includes:

sory

7 0
3 years ago
Other questions:
  • The problem solving process begins by first ______ the problem.
    11·1 answer
  • What are the correct steps to find the system specifications such as the amount of ram or system type?
    14·2 answers
  • Which of the following allows you to view and access important information about your document all in one location?
    11·2 answers
  • By using the internet, your company can obtain discounts thorugh...
    15·2 answers
  • In a typical e-mail address the host is
    14·1 answer
  • Dereck works for long hours on his computer. He frequently experiences physical strain by the end of the day because he does not
    8·2 answers
  • During a network evaluation an administrator discovers excessive cable between a transmitter and its antenna. To clean up the lo
    9·1 answer
  • The two parts of a packet are the certificate and the While storms could be a cause, power _________ are more likely to be cause
    11·1 answer
  • Difference between primary key and foreign key
    12·1 answer
  • What is syntax?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!