1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad1618 [11]
2 years ago
12

Coding with Loops Worksheet

Computers and Technology
2 answers:
BartSMP [9]2 years ago
4 0

Answer:

if you give me brainliest i will answer your question

Explan

BlackZzzverrR [31]2 years ago
3 0
Huhhhgtjkkkbbjggffjknn
You might be interested in
which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?
Dmitry_Shevchenko [17]

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

4 0
2 years ago
Which team behavioral characteristic helps team members to freely express ideas and foster approachability?
vlada-n [284]

Communication is the right answer.

6 0
3 years ago
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as:
icang [17]
~Hello there! ^_^

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as..?

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as botnets.

Hope this helps~





3 0
3 years ago
Why transportation RFP is important?​
liberstina [14]
Accurate and relevant information , a quick process
8 0
3 years ago
WILL MARK BRAINLIEST AND 20 POINTS
Fantom [35]
With templates, you can Create a new document based on previous formatting, create a custom template for future use, and apply different templates to different pages of a document.
4 0
3 years ago
Other questions:
  • You have been doing a lot of web surfing lately as part of your research for your course and along the way you have noticed a gr
    14·1 answer
  • Which windows tool is used to determine if a dynamic disk is corrupted?
    6·1 answer
  • In what way(s) did the password you tried to use not meet the password policy requirements?
    14·1 answer
  • This device operates at layer 2 but functions at the higher layers.
    11·1 answer
  • Which routine is configured to be called by another routine?
    10·1 answer
  • What do you call an unsolicited email message that masquerades as coming from a legitimate sender, and attempts to get you to di
    11·1 answer
  • Linda is the education manager for a national coding service company. Once a month she holds a videoconference with all her codi
    14·1 answer
  • Which of the following behaviors does not harm a company if your employment is terminated?
    9·1 answer
  • Term of The surroundings and conditions of your workplace
    6·1 answer
  • Can anyone help me out with my photography questions?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!