Answer:
To ensure continual user involvement, I will employ a user-centered design system.
This system requires that I gather data from users and incorporate findings into the inventory systems design. The purpose is to create user-friendly inventory and information distribution systems.
To achieve this, I will try to understand the users of the systems, the users' tasks, and the users' work environments. Then, I will evaluate the user requirements based on current and future needs. I will address the user requirements and continuously involve the user in the design and development of the systems.
Explanation:
The deployment of user-centric design is to achieve project success. Using this approach will also save design and development time, cut design and development costs, and improve user satisfaction. This approach will also help me to understand the user needs and requirements and help the users to understand the newly developed systems.
Answer:
A, D, E
Explanation:
Diaries, photographs, and speeches are all forms of primary sources, whereas biographies and newspaper articles are written by a secondary source.
Answer:
a virus
Explanation:
it damage files, documents and destroy them
Answer:
(a) Variable
Explanation:
In the programming world, a variable is used to store data that can be referenced and modified in a computer program. It typically refers to the label for the location (in memory) of a particular data used in programs. For example;
var b = 12.
This implies that the value 12 is stored in a location in memory that is labeled as b. Anytime the value 12 is needed either for retrieval or modification purposes, it can be referenced by simply calling the variable b.
The threat model implied by Greg to reduce the DDoS attack by buying mitigation service reduces the impact. Thus, option C is correct.
<h3>What is DDoS attack?</h3>
DDoS attack has been an acronym to distributed denial-of-service attack. It is a type of cybercrime that forms the development of the internet traffic over a server, and the overloading forms the user to be enable to access the site operations.
The mitigation service enables the legitimate traffic to reach the server with forming the filter to the server traffic. The buying of service by Greg reduces the impact of the attack. Thus, option C is correct.
Learn more about DDoS attack, here:
brainly.com/question/14052714
#SPJ4
Your question seems to be incomplete, the missing options to the question are:
A. Likelihood
B. Total attack surface
C. Impact
D. Adversary capability