1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudik [331]
3 years ago
11

Match the risk mitigation techniques with their characteristics.

Computers and Technology
1 answer:
larisa86 [58]3 years ago
6 0
Avoid- Failing to do certain things to eliminate the possibility of risks.
Transfer-<span>Moving the risk to another party or organization 
that is ready to share the risk financially 
or otherwise.
Accept-</span><span>Considering the negative impact involved in a 
project and carrying it out in spite of the risks.
</span>Mitigate-<span>Lowering the level of risks by making changes 
in your plan.</span>
You might be interested in
WILL MARK BRAINLIEST FOR ANYONES ANSWER!
Anvisha [2.4K]

Answer:

just know that bit gonna be running when I make mine Imma have 720 fps btw today sponsored is nord VPN

4 0
3 years ago
2. Which property is used for hiding text of the textbox?
Softa [21]

Answer:

password char

Explanation:

The password char property allows the text being written in the textbox to be hidden in the form of dots or stars. As such the user entering the password is secure, as no one nearby can know the password by watching the texts.

8 0
3 years ago
Write a logical expression using only and, or and not that is equivalent to the Exclusive NOR (XNOR) gate on 2 inputs, called in
denis-greek [22]

Answer:

in1 = int(input("Enter value one: "))

in2 = int(input("Enter value two: "))

print(in1,type(in1), in2, type(in2))

if (in1 <=0 and in2 <=0) or (not in1 <=0 and not in2<=0):

   print( True)

else:

   print( False)

Explanation:

The if statement of the python source code is used to implement an Exclusive-NOR logic gate that gives a true or high value if both inputs are either true or false.

5 0
3 years ago
Tinh T = a1*a2*a3*...an<br><br> Giúp em với
Studentka2010 [4]

Answer:

??????

Explanation:

??????? okay okay

3 0
3 years ago
Harry is undertaking a digital photography course as the college and wants to
Ludmilka [50]

C. Unconventionally yes it will break down the system potentially causing a virus

4 0
3 years ago
Other questions:
  • An administrator needs to set up an authentication server for users connecting to a network through a VPN. What kind of server c
    10·1 answer
  • Which of the following represents inbound logistics for a bookstore
    13·1 answer
  • ________ are used to translate each source code instruction into the appropriate machine language instruction.
    11·1 answer
  • What are the OSHA construction standards also called ?
    10·1 answer
  • In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?
    10·1 answer
  • Wearables, video playback and tracking devices can help athletes because
    15·1 answer
  • Who Has any idea How to code?
    7·2 answers
  • Five varieties of software​
    13·1 answer
  • Mention any
    14·1 answer
  • What is my mistake on this code? (Python)
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!