1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novosadov [1.4K]
3 years ago
10

Importance of project risk management

Computers and Technology
1 answer:
kkurt [141]3 years ago
5 0
You must spread your risks out like don’t put all your eggs in one basket... don’t rely on on thing because is it goes downhill you have no backup
You might be interested in
You can use this type of program to create a new raster image
butalik [34]

Answer:

yes

Explanation:

8 0
3 years ago
What are the types of hypervisiors ?
melomori [17]
<h2>Answer:</h2>

The correct options are

  • Bare metal and hosted
  • Memory and operating system based  Virtual and physicality
<h2>Explanation:</h2>

There are two types of hypervisors:

Type 1 hypervisor are those hypervisors that run directly on the system hardware such as a “bare metal” embedded hypervisor,

Similarly

Type 2 hypervisor is the kind of hypervisors that runs on a host operating system that provides virtualization services, such as I/O device support and memory management.


6 0
3 years ago
Read 2 more answers
When internet techonology was developed in the 1970s by the department of defense?
Scorpion4ik [409]
TRUE. The internet began as a military infrastructure project for communication purposes.  
3 0
2 years ago
New trends, tools, and languages emerge in the field of web technology every day. Discuss the advantages of these trends, tools,
ikadub [295]

Answer:

Explanation:However, with the emergence of several new web development technologies, tools, frameworks, and languages in the last few years, it has now become quite .

7 0
2 years ago
An access control system that grants users only those rights necessary for them to perform their work is operating on which secu
solmaris [256]

Answer:

B. Least privilege                

Explanation:

  • The principle of least privilege an important principle in computer security.
  • It limits the access rights for users and only grant them with the rights that are sufficient for them to perform their required task.
  • For example a user is granted privilege to execute a file or manipulate data or use only the resources that are required for them to perform a particular task.
  • This principle can be used only to limit and control access rights to system resources and applications.
  • The least privilege is beneficial as it reduces the risk of unauthorized access.
  • For example a user whose task is data entry and has nothing to do with controlling access or granting access rights to users, will only be allowed to enter data to the DB by the principle of least privilege.
7 0
3 years ago
Other questions:
  • Brenda's working on improving a Google Search Ads quality score so it potentially gets a better ad rank and performs better in t
    9·1 answer
  • The magnavox odyssey was a commercial success
    13·1 answer
  • 110011 * 1111 binary calculation
    15·1 answer
  • What is constructive criticism?
    5·1 answer
  • The "instance" relationship shows that something is an object of a ____.
    5·1 answer
  • Tom is very curious as to whether terrorism is truly linked to levels of religiosity around the world. As such, he gathers data
    15·1 answer
  • Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only
    8·1 answer
  • 1. ___________ ensures the integrity and security of data that are passing over a network.
    13·1 answer
  • How did punch cards improve the weaving process?
    11·1 answer
  • you are asked to create a four-digit code using the numbers from 1 to 9. how many possible codes are there--assuming that number
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!