1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novosadov [1.4K]
3 years ago
10

Importance of project risk management

Computers and Technology
1 answer:
kkurt [141]3 years ago
5 0
You must spread your risks out like don’t put all your eggs in one basket... don’t rely on on thing because is it goes downhill you have no backup
You might be interested in
in Google, how should you phrase your search if you want to exclude a certain word from your results(for example,"chocolate")?
dusya [7]
I found this:
ou can exclude words from your search by using the - operator; any word in your query preceded by the - sign is automatically excluded from the search results. Remember to always include a space before the - sign, and none after

I found it here:
http://www.informit.com/articles/article.aspx?p=675274&seqNum=3
3 0
3 years ago
In the previous activity the learner developed an idea for a game, this included the game plot, storyline, characters, interacti
Neko [114]

Answer:

I hope this helps, this is my first time doing an answer in Brainly.

Explanation:

The game concept will be this, your character, being a green lizard, will jump from platform to platform. Constantly scrolling up with the character, but if you fall behind, it's game over.

If I know anything about smartphones is the the screens are usually tiny, and are very hard to play on. So I will impliment motion controls. If you tilt the screen in the direction you want the lizard to go, it will follow that tilt.

The pros is that it's a lot more easy when developing the game, the cons is that the games are usually super small.

3 0
2 years ago
Find a password that "breaks" zxcvbn, i.e. it is probably easy to crack but zxcvbn reports that it has a cracking time of centur
levacccp [35]

Answer:

C0r3CtPP4zzu0Rd

Explanation:

zxcvbn is a password security and "strength" meter. This meter can identify password repetitions and patterns that will make it easier for some of your passwords to be discovered and your account to be hacked. This meter has as easy passwords to be discovered passwords that have dates, popular words or phrases, personal names and etc.

For zxcvbn to consider a password as strong, which would take centuries to be discovered, it is recommended that two words are used. In addition, these words must have a combination of uppercase and lowercase letters, numbers and symbols.

In this case, we can consider that the password "C0r3CtPP4zzu0Rd" is an easy password that could break zxcvbn.

If you pay attention, the password shown above is a code for the words "correct password", however, there is a combination of letters, numbers and symbols that follow a logical sequence and easy to be memorized, however zxcvbn would consider a * that it would take centuries to be discovered.

5 0
2 years ago
One way news orginaztions can influence people is by:
Vlad1618 [11]

A. Slanting information

Media many times takes information out of context and presents it in a manner that isn't accurate. This twists the words and meanings of what really happened

Hope this helped!

~Just a girl in love with Shawn Mendes

3 0
3 years ago
Read 2 more answers
10. In cell R8, enter a formula using the AVERAGEIF function to determine the average number of post-secondary years for student
mart [117]

Answer:

On cell R8, type in the formula  "=AVERAGEIF(M2:M31,"Elected",D2:D31)".

Explanation:

Microsoft Excel is a spreadsheet application developed by Microsoft as a part of the office package, used for statistical analysis of data. It has several tools used for this purpose.

The AVERAGEIF function is used to give the average of numeric column based on a condition. The formula above uses the word 'Elected' in the M column to calculate the average of numbers in the D column.

7 0
2 years ago
Other questions:
  • 2 negative impact of excessive use of computer even in solving mathematical problem.
    11·1 answer
  • What wired channel, commonly used for cable tv, consists of an insulated copper wire wrapped in a solid or braided shield placed
    12·1 answer
  • What is an enterprise system
    14·2 answers
  • When planning a presentation, there are several factors you need to consider. Which of the following is one factor you should co
    8·1 answer
  • What type of account should you use fro signing in to your windows 8 computer if you want to synchronize your settings on other
    6·1 answer
  • Hardware consists of the physical devices associated with a computer system, where software is the set of instructions the hardw
    13·1 answer
  • Whoever understands this first and replies will be the brainliest.<br><br><br><br> Road work ahead?
    9·2 answers
  • Why are the social and ethical consequences of emerging technology hard to
    10·1 answer
  • Kevin is working in the Tasks folder of his Outlook account. Part of his computer screen is shown below.
    14·1 answer
  • The function that overloads the ____ operator for a class must be declared as a member of the class.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!