gracehope034
gracehope034 gracehope034
  • 23-06-2021
  • Computers and Technology
contestada

1) List two hardware methods that can be used to secure data
2)List two software methods that can be used to secure data

Respuesta :

jerryspringger
jerryspringger jerryspringger
  • 23-06-2021

Answer: Steps of the technological design process include: identify a problem, research the problem, generate possible solutions, select the best solution, create a model, test the model, refine and retest the model as needed, and communicate the final solution.

Explanation:

Answer Link

Otras preguntas

Second Link Services granted restricted stock units (RSUs) representing 16 million of its $1 par common shares to executives, subject to forfeiture if employmen
Which of the following is mao zendong responsible for?
g Gladstone Company tracks the number of units purchased and sold throughout each accounting period but applies its inventory costing method at the end of each
We wish to estimate the population mean of a variable that has standard deviation 70.5. We want to estimate it with an error no greater than 5 units with probab
How much will she spend?
Factor using the GCF 5x -15???
What made farming difficult for peasants
We separate U-235 from U-238 by fluorinating a sample of uranium to form UF6 (which is a gas) and then taking advantage of the different rates of effusion and d
A 16-ft ladder is placed 4 ft. from the base of a building. How high on the building will the ladder reach?
If you crossed two pink (RW) birds, what would be the phenotype of the offspring?