1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna11 [10]
3 years ago
11

Which of these can be represented visually by a flowchart?

Computers and Technology
2 answers:
kifflom [539]3 years ago
5 0
I think it is c if not sorry
Mariana [72]3 years ago
4 0

Answer:

i think its C.

if its wrong i'm truly sorry

Explanation:

You might be interested in
Why did Hunter gatherers moved into the<br>America's?​
GrogVix [38]

Answer:

Explanation:

Hunter-gatherers are humans that get the food and living collecting wild plants and pursuing wild animals, this was the first human's adaptation, this people arrive to America from the Bering Strait from Asia Eurasia, they were following some prehistoric mammoths, and using primitive boats arriving at Pacific coast to South America.

8 0
3 years ago
Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability o
Dominik [7]

Answer:

The answer is "assessment"

Explanation:

In the given question some information is missing, that is options that can be described as follows:

a) containment strategy.

b) assessment.

c) incident response.

d) disaster assessment.

Assessment also known as community risk, which is used for evaluations. It played a crucial role in the reaction and recovery after a dangerous incident in any organization.

  • In this process, the Information of the degree and the position, which is lost are included in the collected information by the Accident investigation Taskforce.
  • This data is analyzed to evaluate the needs of members and the entire community, and other choices are wrong that can be described as follows:
  • In option a, It is a part of world war II, that's why it is wrong.
  • In option c, It is a method that is sort major incident, that's why it is wrong.
  • In option d, It uses cost control and risk avoidance, that's why it is wrong.

8 0
3 years ago
Which tag will you use if you want your web page to look the same as your source code?
Stolb23 [73]

Answer:

The <samp> element allows you to output sample code as output.

The <pre> element also provides you the choice to output exactly what written in the source code

Explanation:

The two tags affords you the chance of outputting exactly what you have in the source code as your outputs.

6 0
3 years ago
Discovery of a vulnerability in a software program can potentially be sold to the government. Group of answer choices True False
enyata [817]

Discovery of any vulnerability in a software program can potentially be sold to the government: True.

<h3>What is vulnerability?</h3>

Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.

This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.

Read more on vulnerability here: brainly.com/question/25813524

#SPJ1

4 0
2 years ago
FREE POINTS JUST ANSWER MY LATEST TWO QUESTIONS PLEASE
Mekhanik [1.2K]

Answer:

Look down below for answer!

Explanation:

1. The internet has backup files and a greater authoritative figure can easily see the history on the photo, etc. Some apps have save files no matter what and can track the post, photo, and when and why it was deleted. The impression the photo left on people may not be left either.

2. The zoo can be breaking the law because even though they store the information safely, they do not have the visitors consent to having their information.

7 0
3 years ago
Read 2 more answers
Other questions:
  • What is a valence orbit?
    13·2 answers
  • In linear​ programming, choices available to a decision maker are called
    12·1 answer
  • How do you recognize the brand name of a drug in the package insert?
    15·1 answer
  • Select the correct answer
    11·2 answers
  • A BufferedReader has a constructor that takes a single InputStreamReader parameter. InputStreamReader has a constructor that tak
    8·1 answer
  • As the network engineer, you are asked to design an IP subnet plan that calls for three subnets. The largest subnet needs a mini
    14·1 answer
  • A style sheet consists of CSS ______________________ that specify the layout and format properties to apply to an element. *
    13·1 answer
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
  • Transitive spread refers to the effect of the original things transmitted to the associate things through the material, energy o
    6·1 answer
  • If you give someone ______ to your device, they can control it through another phone or computer.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!