1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bezzdna [24]
4 years ago
7

A project team was researching the risks involved in setting up a computer system. They decide to go ahead with their plan, rega

rdless of the risks involved. In which way are they handling the risks?
They are accepting the risks.

They are avoiding the risks.

They are mitigating the risks.

They are transferring the risks to a different part.
Computers and Technology
1 answer:
timofeeve [1]4 years ago
8 0
The correct answer should be <span>They are accepting the risks.

Avoiding it would be changing the plan to eliminate the risky parts, while mitigating it would be already having fulfilled risks that need to be resolved. Transferring would be sorting it in such a way that it becomes someone else's problem. They are accepting them and moving on.</span>
You might be interested in
What processing software enables the user to
Dafna11 [192]

Answer:

I think its B

Explanation:

software enables users to create and edit documents.

6 0
3 years ago
2. Damaris is creating an object in Blender. He wants to change the illumination of the object that he is working on, but can’t
MariettaO [177]

The way that  Damaris can change the illumination of the object that he is working on in Blender is by:

  • First, one need to left-click on the lamp and then put  it in a place in your scene so that it can be able to illuminate the needed or required area. You can also do the above by  tweaking a lot of settings using the lamp options so that you can be able to get the lighting that you need . The most popular ones to tweak are those that have strength and color.

<h3>How do I change my light in Blender?</h3>

To view all options related to lights in Blender, enter the Object Data tab in the properties window while the lamp is still chosen.

You can alter your light kind and set energy and color settings at the top.

Therefore, The way that  Damaris can change the illumination of the object that he is working on in Blender is by:

  • First, one need to left-click on the lamp and then put  it in a place in your scene so that it can be able to illuminate the needed or required area. You can also do the above by  tweaking a lot of settings using the lamp options so that you can be able to get the lighting that you need . The most popular ones to tweak are those that have strength and color.

Learn more about Object from

brainly.com/question/2141363
#SPJ1

4 0
1 year ago
Given an array of values which initially contains 9 8 7 6 5 4 3 2 1, what does the array look like after bubble sort has execute
Phantasy [73]

Answer:

//Here is code in C++.

//include header

#include <bits/stdc++.h>

using namespace std;

// function to print the array

void out_arr(int inp[], int len)

{

for (int i = 0; i < len; i++)

 cout << inp[i] << " ";

cout << endl;

}

// main function

int main()

{

   // decalare and initialize the array

int inp[] = {9,8,7,6,5,4,3,2,1};

//find the length of array

int len = sizeof(inp)/sizeof(inp[0]);

int x, y;

// perform bubble sort, only 3 pass

for (x = 0; x < 3; x++)  

{

for (y= 0; y< len-x-1; y++)

 if (inp[y] > inp[y+1])

 {

  int t=inp[y];

  inp[y]=inp[y+1];

  inp[y+1]=t;

 }

 

 cout<<"array after "<<x+1<<" pass"<<endl;

 // print the array after every pass

     out_arr(inp, len);

}

return 0;

}

Explanation:

Declare an integer array "inp" and initialize with {9,8,7,6,5,4,3,2,1}. Find the length of the array.In first pass of bubble sort, largest value is placed at the correct position in the array. And in the second, second largest value is placed at its correct position. After the n pass, array will be sorted. In each pass, each element is compared with the next element. if the value is greater than swap them. This continues for all elements in each pass. In the end of a pass a value is placed correctly. So if there is only 3 pass then 3 largest values will be placed at their right place.

Output:

8 7 6 5 4 3 2 1 9                                                                                                              

array after 2 pass                                                                                                            

7 6 5 4 3 2 1 8 9                                                                                                              

array after 3 pass                                                                                                            

6 5 4 3 2 1 7 8 9

7 0
3 years ago
Refer to the exhibit. A network administrator configures AAA authentication on router R1. The ACS servers are configured and run
oksian1 [2.3K]

Answer:

The correct answer for the following question is authentication process stops.

Explanation:

Authentication for the Telnet connection can be defined by the AAA method lists the AUTHEN. The AUTHEN lists define that first authentication methods is through the ACS servers by using a RADIUS protocols (or the RADIUS servers), and second authentication methods is use a local users database, and third methods is to use enable password. In the scenarios, however, the administrators fails to passes an authentication by first method, and the authentications processes stop and no the other authentications method are allowed.

3 0
3 years ago
I store data that the CPU needs. What am I?
Citrus2011 [14]

Answer:

Memory

Explanation:

Memory send commands to the CPU . Alternative modes of memory exist, and each one of them plays an essential role in operating a software machine.Memory is commonly called storage. Either the storage is unstable or non-volatile.

4 0
3 years ago
Read 2 more answers
Other questions:
  • If you were practicing keyboarding and the excercise contained the letters q,o,e,p,r and t, what section of the keyboard are you
    14·1 answer
  • An isotope of an element has:
    11·2 answers
  • Which type of storage disk and disk drive can be used in the given situation? Amy wants to borrow an interesting movie from Bruc
    10·2 answers
  • Who like fortnite??????
    12·2 answers
  • If you need to determine impacts on revenue resulting from an increase or
    15·1 answer
  • #Write a function called hide_and_seek. The function should #have no parameters and return no value; instead, when #called, it s
    7·1 answer
  • 1. Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative va
    11·1 answer
  • An array similar to a phone book has 1000 names arranged as names [0], names[1]....names[999]. Nancy wants to search a name X in
    15·1 answer
  • Hola, disculpa me podrías ayudar enviándome una captura dándole like a este video? Por favor, es un proyecto escolar en el que e
    10·1 answer
  • Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!