gracehope034
gracehope034 gracehope034
  • 23-06-2021
  • Computers and Technology
contestada

1) List two hardware methods that can be used to secure data
2)List two software methods that can be used to secure data

Respuesta :

jerryspringger
jerryspringger jerryspringger
  • 23-06-2021

Answer: Steps of the technological design process include: identify a problem, research the problem, generate possible solutions, select the best solution, create a model, test the model, refine and retest the model as needed, and communicate the final solution.

Explanation:

Answer Link

Otras preguntas

Close cafe has regular coffee and decaffeinated coffee. This morning, they cafe surge 100 guard bees in all karma temper son of weight to were regular. How many
Identify the graph of the solution set of : x^2 -9/ x^2+6x+8
What are brachiosauras
Evaluate 2d + 3 when d = 8
when dissolved in water acids make solutions that taste
Find the simple interest on $5,000 at 4% interest for 3 years.
1. Consider the exponential function f(x)=10(2)". (a) Find the value of f(0). What point does this represent on the graph of y= f(x)?
How did China affect the Korean War?
the equator is most accurately represented on a cylindrical projection map. true or false?
Colby packs 31 boxes in one day. He packs 12 boxes in the morning and some boxes after lunch. How many boxes does Colby pack after lunch?