1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sukhopar [10]
3 years ago
15

Which term describes a process in which different stages are repeated when necessary

Computers and Technology
2 answers:
AURORKA [14]3 years ago
6 0

Answer:

Recurcive would be the correct answer

Gennadij [26K]3 years ago
3 0

Answer:

I believe it B, because you need to test a prototype over and over to get it right.

Explanation:

You might be interested in
What type of impacts can a computer virus have on a computer?
kolbaska11 [484]
Viral dna can be detected by PCR .
5 0
3 years ago
Suppose you send data to the 11111111 11111111 11111111 11111111 ip address on an ipv4 network. to which device(s) are you trans
xenn [34]
All devices on your network segment.
4 0
3 years ago
Limitations of the information systems used by tesco​
Kryger [21]

Answer:

The only disadvantage or the limitation systems is due to the outsourcing policies. Outsourcing is done to take advantage of low-cost labor in various developing countries. However, through outsourcing, companies loses control over management, results in confidentiality and security issues. The quality also decreases, as the third parties are driven by profit. There is disbelief among the employees as well concerning the knowledge management system due to outsourcing, as they believe the whole setup to be suspicious. And there is various hidden cost also related to outsourcing like the cost of lawyers, as you need to hire one to take care of the contracts. Some more disadvantage might also be sited but all are related to outsourcing, and else the information systems used looks like being quite great.

Explanation:

Please check the answer section.

8 0
3 years ago
Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this
ra1l [238]

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

8 0
4 years ago
2 What Java keyword is used to create a subclass? interface. extends. implements. inherits.
n200080 [17]

Answer:

extends

Explanation:

When you create a subclass, you basically say "I'm creating a new class, but for now it will look and behave the same as that other class", then you add its own personality.

The syntax is:

class SubClass extends SuperClass

Where SubClass is your new subclass what inherits methods and variables from the SuperClass.

So, if you add nothing to the SubClass, it will be a carbon copy of the SuperClass. But you can add methods and variables exclusive to this SubClass that the SuperClass won't have.

5 0
3 years ago
Other questions:
  • What can help establish the focus and organization it relies on?
    6·1 answer
  • The project started the development of inter-network connections using tcp/ip that has evolved into the internet today.
    5·1 answer
  • Online companies typically have a(n) _________ on their websites that clearly states what information is collected from users an
    7·1 answer
  • You are using a wireless client adapter with a site survey utility and a notebook computer to perform a manual site survey in a
    7·1 answer
  • ​______________________ is a general security term that includes computer​ viruses, worms, and trojan horses.
    13·1 answer
  • _______ are special incentives or excitement-building programs that encourage consumers to purchase a particular product, often
    7·1 answer
  • Which one of the following statements referring to mobile Internet
    5·2 answers
  • In cell J6, insert a formula using the OR function that returns TRUE if the rating (cell 16) equals "A" or the email reminder (c
    5·1 answer
  • Why is this happening when I already uploaded files to my drive?
    13·1 answer
  • You are given an integer N where 0 <= N <= 100, followed by another line of input which has a word W with length L where 1
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!