1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luda [366]
3 years ago
9

Which of the phases of the software development life cycle (SDLC) would the following action take place in?

Computers and Technology
1 answer:
bezimeni [28]3 years ago
7 0
The answer is C i'm positive
You might be interested in
an internet connectivity plan is also known as a ________. a) text plan b) data plan c) mobile plan d) network plan
AnnyKZ [126]
Can u please be more specific sir
3 0
3 years ago
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
Which of the following does NOT describe word processing?
GarryVolchara [31]

Answer:

Editing graphics

Explanation:

I looked it up (at least I was honest)

3 0
3 years ago
Read 2 more answers
What is an extrinsic value? A. something that is valuable in and of itself B. something that is valuable because it leads to ano
irakobra [83]
B) something valuable outside of itself, leading to another thing of value.
3 0
3 years ago
Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational sta
Alona [7]

Answer: E) Push reporting

Explanation:

Push reporting is defined as the reporting process in which information is believed to be shared by the reporter among the audience or viewers. Audience does not have any particular knowledge about that subject and basically unaware.Reporter researches about the topic significantly before sharing information.

Other options are incorrect because pull reporting is the reporting in which audience approach to gain knowledge on topic .Adhoc reporting is type of business intelligence mechanism. Exception reporting is reporting of actual task which moved away from expectation. Drill down reporting is exploration of data in layers.

Thus, the correct option is option(E).

6 0
3 years ago
Other questions:
  • - The concept of communication competence suggests there is no single "ideal" or "effective" way to communicate in every situati
    6·2 answers
  • Rate monotonic Analysis (RMA) is a model for predicting whether or not a system will meet its timing as well as throughput requi
    6·1 answer
  • Could you please check my answers to this layout user defined data types
    15·1 answer
  • FREE BRAINLIEST!!!!
    7·2 answers
  • 16. What's the difference between a footnote and endnote?
    11·1 answer
  • All of the following are technical solutions to protecting user privacy except: Group of answer choices Data use policies Anonym
    12·1 answer
  • Cuales fueron las consecuencias que creo el storm worm (gusano storm, el informatico)??
    5·1 answer
  • The process of sending a result back to another part of the program is
    14·1 answer
  • What are LinkedIn automation tools used for?
    14·1 answer
  • Using an open connection to a small company's network, an attacker submitted arbitrary queries on port 389 to the domain control
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!