Answer:
The technique helps you explore possible risks by providing access to risk areas identified in the past is explained below in details.
Explanation:
Risk administration commences with the system of classifying risks. In this method, we examine future developments or circumstances that may influence our understanding and capacity to accomplish our aims. Risk identification incorporates estimating out where, when, how, and why such situations may happen.
Answer:
The answer to this question is "Confidentiality".
Explanation:
The answer is Confidentiality because in any computer system many files are important for there user. If the file was deleted, corrupted or stolen from the computer. So the user faces the difficulty to avoid this type of problem computer system provides a technique that is access control or it is also known as Confidentiality. It is a technique that controls who or what type of user's use of resources in a computing environment.
So the answer to this question is Confidentiality.
Uses of excels
1. Personal fitness log: log the things you eat along with its calories and record it every day. Make a pivot of the data and see how much you have consumed. Along with this, add sleep duration, and measure the number of hours that you have slept each day during the month.
2. Budget Planner: Make a monthly budget and maintain a log of things you buy in order to keep a track of your budget. This will help to keep a track and you will be more or less in the limits of the budget allocated during the start of the month.
3. Headache Log: If you experience frequent headaches, then log that and when there is enough data a comparison can be done.
You can make charts and other graphical representations of the data to compare and contrast your trends and can make an efficient analysis. All these features which are present in excel are not available in other applications all at one time.
I would say False, it is a personal computer and you should be able to update it yourself. ;w;
Your welcome <3
Notes that are illegible and hard to read and notes that cannot be used as reference are characteristics of ineffective notes.