gracehope034
gracehope034 gracehope034
  • 23-06-2021
  • Computers and Technology
contestada

1) List two hardware methods that can be used to secure data
2)List two software methods that can be used to secure data

Respuesta :

jerryspringger
jerryspringger jerryspringger
  • 23-06-2021

Answer: Steps of the technological design process include: identify a problem, research the problem, generate possible solutions, select the best solution, create a model, test the model, refine and retest the model as needed, and communicate the final solution.

Explanation:

Answer Link

Otras preguntas

Select the appropriate term to complete the sentences below. A is a natural material used by humans that cannot be replaced. A is a natural material used by hum
A line passes through the points (–1, –5) and (4, 5). The point (a, 1) is also on the line. whats a value?
During which stage does land get ready for the arrival of new species? A. migration B. ecesis C. nudation D. reaction E. competition
The number of typing errors made by a typist has a Poisson distribution with an average of two errors per page. If more than two errors appear on a given page,
in order to graph a linear equation in slope-interceot form, what do you need to know? what does the equation look like when the y-intercept of the line is equa
How do you solve this? And what would the answer be?
One way that the two Declarations differ is that___.
Solve the equation. 15x^2 – 28x + 5 = 0
How many definitions of "pungnent" are listed
How much did planned parenthood donate to democrats