1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novosadov [1.4K]
4 years ago
10

Importance of project risk management

Computers and Technology
1 answer:
kkurt [141]4 years ago
5 0
You must spread your risks out like don’t put all your eggs in one basket... don’t rely on on thing because is it goes downhill you have no backup
You might be interested in
Which statement is most true about computers today?
Olegator [25]

Answer:

I think it's B because it can't be any other

4 0
3 years ago
Read 2 more answers
Triggers can be created in operational systemsto keep track of recently ------------------ records.o Deletedo Updatedo Inserted
Crank

Answer:

Inserted

Explanation:

Triggers can be created in operational systems to keep track of recently inserted records.

3 0
3 years ago
Write 4 types of viruses , explain them briefly.
wariber [46]

I can help with two.

Web Scripting Virus, A sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website.

FILE INFECTOR, targeting executable files (.exe), file infector viruses slow down programs and damage system files when a user runs them.

8 0
3 years ago
Void adc_init(void)
Andrei [34K]

Answer:

This code tells us that When ADCL is read the ADC register is not updated consequently,if the result is  left adjusted and no more than 8 bit precision is required it is sufficient to read ADCH.

3 0
3 years ago
________ allows visitors to add, remove, or edit its content.
liberstina [14]
That would be Wiki.......
6 0
3 years ago
Other questions:
  • #Write a function called "angry_file_finder" that accepts a #filename as a parameter. The function should open the file, #read i
    13·1 answer
  • After Intel faced strong shifts in technologies, such as cloud services, social networking, mobile devices, etc., Intel realized
    11·1 answer
  • Common icons found on the Windows desktop are _____.
    6·2 answers
  • Which one of the following terms is defined as the material and surfaces upon which an artist works?
    9·1 answer
  • In 3–5 sentences, describe how technology helps business professionals to be more efficient.
    7·2 answers
  • The first step in the information systems planning process is to ___________.
    8·1 answer
  • Which of the following statements is false? A constructor is similar to a method but is called implicitly by the new operator to
    6·1 answer
  • Read a sentence from the console.
    6·1 answer
  • Drag each tile to the correct box.
    8·1 answer
  • WAP to find the area of cuboid​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!