1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
2 years ago
7

What is used for risk response control?

Computers and Technology
1 answer:
miskamm [114]2 years ago
6 0

Answer:

Risk response control uses methods such as mitigate, avoidance, shift, actively accept, and passively accept.

Explanation:

Risk Response Control refers to the procedure of evaluating residual risks, detecting new risks, guaranteeing the execution of risk plans, and assessing the success of the plans in decreasing risk is known as risk response control. Whereby the risk response control techniques include acceptance, avoidance, transfer, and mitigation

You might be interested in
Brianna is taking a backpacking trip in the wilderness and wants to back up the photos from her camera. Which type of storage de
Katen [24]

Answer:

<u><em>C</em></u>

Explanation:

Flash drives usually have an input (E.G. one of those android charger connectors), so just plug that into your camera, and load the flash drive with the photos. Then go home and plug the USB on the flash drive into your PC. If there isn't already, a folder will be made in your "Pictures" folder on your PC, to which you can open the folder, and then your photos should be there. From there you can open them, print them, etc.

Hope this helped, and sorry if I didn't answer in time.

6 0
3 years ago
A minor with prior convictions of Minor in Possession (MIP) who is charged with a subsequent MIP may be penalized with a jail se
GarryVolchara [31]
The minor may be penalized with a jail sentence of up to thirty days for his second offence.  A jail sentence of up to sixty days is possible for third offence. Under MCL 436, a minor is someone who is under twenty one years old. Such minors may not purchase, consume or be in possession of any alcoholic liquor. Possession of alcoholic drinks can be actual or constructive. It is actual when you have direct physical control over it and it is constructive when you know where it is and you have reasonable access to it.
3 0
3 years ago
Read 2 more answers
The term callee save denotes the case where the __________ (calling / called) program saves the contents of registers whose cont
marysya [2.9K]

Answer:

The right approach is "called". The further explanation is described below.

Explanation:

  • Callee saved suggests that whenever the feature returns or exists, the callee needs to save other registrations and afterward recover them at either the conclusion of the conversation even though they have the promise for the caller just to maintain these very same values.
  • It's indeed necessary to retrieve them, even though at any stage mostly during call individuals are pummeling.
4 0
3 years ago
Taylor is getting ready to send an e-mail. In three to five sentences, give Taylor some advice for sending an effective email.
KengaRu [80]

Answer:

  • Include subject lines since they are important
  • use bullet points
  • keep it short
  • avoid too many exclamation marks
  • watch your tone
3 0
3 years ago
4. A friend knows you are taking a technology class in college and asks you how a hard drive works. In your own words, describe
sveticcg [70]
Keep it simple... it holds whatever info' you want. would he/she understand?


3 0
3 years ago
Read 2 more answers
Other questions:
  • SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and
    12·1 answer
  • What is the line tool used for in photoshop
    6·1 answer
  • Write an if/else statement that compares the variable age with 65, adds 1 to the variable seniorCitizens if age is greater than
    14·1 answer
  • All of the following are types of goals listed in the course except?
    14·2 answers
  • How Much Memory Did the First Computers Have?
    5·1 answer
  • Authentication is a mechanism whereby unverified entities or supplicants who seek access to a resource provide a label by which
    12·1 answer
  • The <br> is an image at the top of the page that includes the title.
    14·1 answer
  • What is an a free open source content management system for publishing web content​
    8·1 answer
  • Anyone here good with Alice? I need help ASAP
    10·1 answer
  • Write a one register parameter procedure that converts an ASCII digit in AL to its corresponding binary value. If AL already con
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!