1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin2010 [14]
3 years ago
15

An IT company revises its process parameters in response to complaints from vendors that products were not ready on time. This w

ould be an example of _____. a. a corrective action b. cost forecasting c. defect repairs d. a preventive action
Computers and Technology
1 answer:
Leto [7]3 years ago
6 0

Answer:

Option a: corrective action

Explanation:

A corrective action is a way to offer the remedy to a process or product which fail to meet expectation and doesn't work as intended. This is one of the management aspect to improve the quality of a product or process. By running corrective action, the undesirable damage brought by the erroneous or faulty process can be eliminated or at least reduce to certain extend.

You might be interested in
Which type of address defines a single network interface in a computer or other device?
White raven [17]
MAC address
......... ..
4 0
3 years ago
Write a program to Test if mold is stored in the variable word.
Aloiza [94]

word = whatever value you want.

if "mold" in word:

   print("Mold is in the variable word.")

else:

   print("Mold is not in the variable word.")

7 0
3 years ago
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
What is a registered degree
dezoksy [38]

Answer:

I not sure

Explanation:

I think it's when a college student gets a degree for a job or something??? I dont know. I to young to know ;-;

lol

5 0
3 years ago
Which computer device works like the human central nervous system by connecting all the computer’s parts together and allowing t
ladessa [460]
The computer device that works like the human central nervous system is the motherboard. The motherboard is the main PCB (Printed Circuit Board) that exists inside most PC's, and in certain other systems. The function of the motherboard is to contain most of the essential components to a functioning system. This includes the CPU (Central Processing Unit) and storage of memory.
7 0
3 years ago
Read 2 more answers
Other questions:
  • What three components should be included in a computer that is used to create TV commercials and music videos? (Choose three.
    15·2 answers
  • Software designed specifically for managing real estate is an example of ________ software. Select one: A. e-commerce B. vertica
    7·1 answer
  • 3. The invention of the transistor was important to the development of computers because it
    5·1 answer
  • Right click on a spot of your desktop that is not covered by an icon, window, or menu. when the menu comes up, play with the opt
    7·1 answer
  • Two ways in which the media does not reflect the society you live in.
    9·1 answer
  • What does a GPA show
    14·2 answers
  • Question 13(Multiple Choice Worth 5 points)
    6·1 answer
  • What do the Brainly points do? sorry im new here and i dont know how to internet rn .-.
    7·2 answers
  • Can you distinguish between the following examples and determine which one is NOT creative work? a. software b. slogan c. screen
    15·1 answer
  • You’ve been tossed into an insane asylum. What do you tell the people there to prove to them that you don’t belong inside?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!