Answer:i would love to help but are there any answer choices?
Explanation: please provide answer choices for an accurate answer
Answer:
you will be fail in exam noted your name and email.
Explanation:
you will be failed in this paper. i will meet to HOD to sure that you will be failed in all papers.
Answer:
Threat of substitute products or services
Explanation:
Threat of substitute products or services is one of the porter's 5 forces, it talks about a product being available for purchase by consumer as a replacement for a substitute product from another industry.
A product is considered a substitute if it offers the same satisfaction consumers gets from it when compared with another product of the same type but from another industry. As stated by Porter's 5 forces "Threat of substitute" helps to give structure to how competition is in an industry.
When there is the availability of threat of substitute for a product, it tends to affect the income of a particular industry that has a substitute to their product as consumers can decide to go for the substitute.
Permanent storage, also called persistent storage, A permanent storage of the computer is hard disk. The data stored in hard disk is permanent. It is primary use is long-term data storage.gym starts his laptop He sees some commands in numbers appearing on the screen these instructions are being preceded by the control unit because when hr start the data is loaded and take some time.
Answer:
Kindly check explanation
Explanation:
The Red team VS Blue team exercise can be explained as a simulated form of exercise or challenge which is intentionally triggered by an organization in a bid to test and access its level of security in other to stay in top of an actual external threat that might be perpetrated. In the simulated exercise, the red team act as the attacker by deploying several forms of threats which are used by actual attackers. The blue team on the other hand act as guard to repel tune attack. All these helps organizations to detect possible weaknesses and loopholes in their system which they can improve on in other to promote system and information security.