gracehope034
gracehope034 gracehope034
  • 23-06-2021
  • Computers and Technology
contestada

1) List two hardware methods that can be used to secure data
2)List two software methods that can be used to secure data

Respuesta :

jerryspringger
jerryspringger jerryspringger
  • 23-06-2021

Answer: Steps of the technological design process include: identify a problem, research the problem, generate possible solutions, select the best solution, create a model, test the model, refine and retest the model as needed, and communicate the final solution.

Explanation:

Answer Link

Otras preguntas

Why do modern scientists use repeated experiments to develop and test hypotheses?
the freedom to make your own decisions can be limited if the business you choose is a
Which rule best describes the pattern?3, 9, 27, 81, ___,____,___
given V=4/3(pi)r^(3) and S=4(pi)r^(2) for a sphere, and the fact that the radius of the sphere is decreasing at 1/2 inches per minute, find the rate at which th
people in sahel usually work in secondary industry wheres the mistake
What did the battle of El Alamine reveal about hitler
Why is 40 days so important?
Why do whales not evolve gills?
which one of the following businesses would be the most difficult to get funding for
There are 60 members in the school glee club. The glee club needs to raise $5000 for a trip to a national competition.The school agreed to contribute $1000 towa