gracehope034
gracehope034 gracehope034
  • 23-06-2021
  • Computers and Technology
contestada

1) List two hardware methods that can be used to secure data
2)List two software methods that can be used to secure data

Respuesta :

jerryspringger
jerryspringger jerryspringger
  • 23-06-2021

Answer: Steps of the technological design process include: identify a problem, research the problem, generate possible solutions, select the best solution, create a model, test the model, refine and retest the model as needed, and communicate the final solution.

Explanation:

Answer Link

Otras preguntas

At a pet store the ratio of cats to dogs sold was 10:1. If there were 60 cats that were sold, how many dogs were sold?
Who was MOST responsible for protecting the land along the Atlantic seaboard that had been claimed by earlier explorers? General Washington Second Continental C
a mass of 12.0g of carbon contains what?
Which underlined word in the sentence is a possessive adjective? Dad reminded us to fasten our seatbelts in the old car. A. our B. old C. us D. Dad
What is 75 cm = ___ m? 251 km = 251,000 ___? 0.46 cm = ___ mm? 58 mm = ___ m? Thank you :)
3x+2y+2z=3 x+2y-+z=5 2x-4y+z=0
a contraction that rhyme's with the opposite of narrow
Which of the following is true about foreign and domestic affairs? They are completely separate types of policy issues that do not affect one another. Leaders
Which underlined word in the sentence is a possessive adjective? Dad reminded us to fasten our seatbelts in the old car. A. our B. old C. us D. Dad
Why wasn't Kenny friends with LJ anymore