Answer:
iooooooooooooooooooooo
Explanation:
ooooooooooooooo
oooo9ooooo9oooooooooo
ooooooooooooooppppooooooooooo
oooooooooooo
ooooooooooooooooooooo
Answer:
Plasma monitors are power hungry devices 2 - 3 times more than a CRT monitor making this technology unfit for use in portable devices like laptop computers where batteries are used as the power source. Plasma monitors are extremely susceptible to screen burn.
Explanation: pls mark my answer as brainlist
Answer:
Days of the week including weekends Fill Weekdays – you can autofill working days of the week excluding weekends. This is very cool. I can autofill dates excluding the weekends. Fill Months – and you can use the full word or a standard abbreviation for the month, and Excel will autofill the sequence.
Explanation:
Answer:
(b). dependency and hedging.
Explanation:
In the management of risk, four common approaches for reducing risk are;
i. <em>Avoidance</em>: Especially if a risk involved in the management of a resource (or project) poses or presents a negative consequence, the best way to manage the risk simply avoid it by making sure it doesn't happen. This can be by cancelling a project or restructuring it.
ii. <em>Adaptation</em>: Another way of managing the risk associated with a resource (human or non-human resource) is to control the risk either by increasing resilience or reducing vulnerability. This is called adaptation.
iii. <em>Dependency: </em>This means accepting the risk since every project or business has inherently in it some risk associated. Dealing with it might be a way out especially knowing that there might be some experience to be gained in order to tackle similar situation in the future.
iv. <em>Hedging: </em>This means transferring the risk to some other business or organization. An example might be to get an insurance to manage this risk. In this case, the risk is transferred to the insurance company.
Answer:
the second last option
Explanation:
secure HTTP is armed with passwords to ensure that only authorised users gain entry.
the data is encrypted during transmission