gracehope034
gracehope034 gracehope034
  • 23-06-2021
  • Computers and Technology
contestada

1) List two hardware methods that can be used to secure data
2)List two software methods that can be used to secure data

Respuesta :

jerryspringger
jerryspringger jerryspringger
  • 23-06-2021

Answer: Steps of the technological design process include: identify a problem, research the problem, generate possible solutions, select the best solution, create a model, test the model, refine and retest the model as needed, and communicate the final solution.

Explanation:

Answer Link

Otras preguntas

If the president does not agree with a law, it is his or her responsibility as chief executive to _____.
Wich of the following is the most appropriate unit to describe the rate at wich data is transferred using the internet ?
Simplify: log base 3 (1/3) ...?
What is an example of hamartia, anagnoresis, and paripeteia in the novel Into the Wild and give 1 quote for each?
what would the world be like today if maps had never been invented?
What is the ratio 4:6 in simplest form?
Fill in the blanks with the correct conjugation of one of the following verbs. almorzar poder encontrar recordar dormir volver costar 1.Ella a0 en la cafetería.
trying to find derivative of y = x^(lnx), show step-by-step solution
15% of nine dollars equals what
Consider the two vectors A(with arrow above)=5i-3j and B(with arrow above)=-i-2j 1. Calculate A (with arrow above) + B (with arrow above) 2. Calculate A (with