1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir [108]
4 years ago
13

Which risk management framework does the organization of standardization publish

Computers and Technology
1 answer:
olga2289 [7]4 years ago
3 0

Answer:

ISO 31000:2009 publishes principles and generic guidelines on risk management.

Explanation:

ISO 31000:2009 can be applied to any public, private or community company, organization, society or individual. Hence, ISO 31000:2009 is not particular to either business or area.

ISO 31000:2009 can be implemented during the period of an industry and to a broad variety of actions, including policies and judgments, guidance, methods, functions, plans, goods, services, and assets.

ISO 31000:2009 can be implemented to any type of danger, whatever its kind, whether possessing positive or negative outgrowths.

You might be interested in
Joaquin is considering a career as an animator and wants to know more about the daily work of an average animator. Which strateg
Advocard [28]
Lacking a response to my question, I'll assume there's no "correct' answer here. 

Joaquin could contact the university's graphic arts department, or if he's interested in the programming side of it, the computer science department, and ask if they have any information on the topic. If he's already majoring to become an animator, then he should talk to one of his professors to see if they know someone in the business that would speak with Joaquin. 

The faster and better way would be to go to reddit, or some site at which animators congregate (most probably found through Google), read the forums, and create if he's not finding a suitable answer.
3 0
4 years ago
In what ways can technology help you be more
Liono4ka [1.6K]

Answer:

All the options below A-D apply.

Explanation:

A) computers and printers allow for the creation of electronic documents. Apps which detect grammatical blunders help to reduce and eliminate grammatical errors thus making the document more concise, lucid and to the point.

B) ICT enables one communicate with anyone, anywhere in the world. With a mobile phone and the relevant apps, it is possible to reach any country via the internet or via the traditional telecommunications systems.

C) Thumb Drive is also known as a Flash Drive or a USB Storage Device. It allows for the storage all types of file/documents. They may be vidoes, audio files, word processed files, etc.

D) Apps can help with procastination.

The can help on to set up reminders about tasks that ought to be done.

Cheers!

5 0
3 years ago
¿ pregunta y respuesta a formulas cual su resultado sea porcentaje, para excel?
r-ruslan [8.4K]
<span>Para evitar esto, primero puede calcular sus números como porcentajes. Por ejemplo, si escribe la fórmula = 10/100 en la celda A2, Excel mostrará el resultado como 0.1. Si luego formatea ese decimal como un porcentaje, el número se mostrará como 10%, como era de esperar

</span>
4 0
3 years ago
What does the "https://" at the beginning of a URL denote, as opposed to "http://" (without "s")? a] That the site has special h
sergey [27]

Answer:

b

Explanation:

HTTP is unsecured while HTTPS is secured and does not provide unauthorized access to any data given to it.

6 0
3 years ago
Select the correct category of cybersecurity described.
Shalnov [3]

Answer:

Network security

Explanation:

Network security is a category of cybersecurity that is related to the protection of the infrastructure of the computer network from unauthorized access and intrusion that may be from intended attack or from an expedient  program which may result in the modification, malfunctioning, misuse or unacceptable disclosure of the network and the contents of the network

The category of cybersecurity that 'prevents intruders from accessing, misusing, destroying, adapting, or improperly disclosing networks, network infrastructure, or the information contained within networks' is network security.

6 0
3 years ago
Other questions:
  • Choose an ethical person you admire. This could be someone you know (such as a parent, friend, or teacher) or someone you don’t
    8·1 answer
  • Match the spreadsheet features with their respective descriptions.
    9·2 answers
  • Andy is trying to put together a holiday gift knapsack (with W=8) for Sarah. He has n items to choose from, each with infinitely
    15·1 answer
  • Which of these statements sums up why the computer is the most visible and
    15·1 answer
  • The "great big secret" Ohanian talks about is the idea that:
    15·1 answer
  • Cuales son mis fortalezas como estudiantes
    14·1 answer
  • What happen if file server stops working?
    5·1 answer
  • To print photographs in color.​
    7·1 answer
  • What should Anthony use to determine his available study hours for an upcoming project? LOOK AT THE PICTURE
    8·2 answers
  • Which of the following best describes a balanced reaction
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!