1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OleMash [197]
3 years ago
5

Which of the following are considered in a risk table?

Computers and Technology
1 answer:
Margarita [4]3 years ago
6 0

Answer:

We need to find that out of these four, which of them have the risk involved. the severity and probability have the risk involved, and hence it is one of the options. The instances are for classes. And all the instances have some kind of outcomes, as they are of one class. And hence, there is no risk involved in this. The variables and assumptions also don't have any risk involved, as as we will be assumed, that will be the value of the variable. However, Biases is a risk, as it is not known how much and when somebody is biased. And hence margin of error and biases are the risk involved certainly. And hence, A and D are the correct options here as they can be considered as the risk table.

Explanation:

Please check the answer section.

Remember, what is not in our hand is a risk.

You might be interested in
When a user utilizes another computer to communicate with a third party, with the result that the third party cannot recognize t
avanturin [10]

Answer:

Online or Web Proxy

Explanation:

Web or online proxy allows you to hide your Internet Protocol (IP) address from the website you are trying to visit or access. It is like a shield between the website you are accessing and you. They can be seen as a middleman between you and the site you are visiting and as such, the site sees that a specific IP address is accessing its server but the address is not yours as all requests between your computer and the web server are first passed through the proxy server.

<em>Hope this helps!</em>

4 0
3 years ago
The internet in this Packet Tracer network is overly simplified and does not represent the structure and form of the real intern
Vlad1618 [11]

Incomplete question. However, I answered from a general IT perspective.

<u>Explanation:</u>

It is important to note that the internet |(or real internet) in this case, refers to a global network of interconnected networks (internetworks) linked together for the purpose of communication. In other words, it is a broad global network arranged in a mesh network topography form.

It is also important to <em>remember </em>that nobody owns the internet, in other words, it is open an source network. So some internet service providers (ISPs) have a business model where they make revenue by having users pay in other to have the internet service delivered to them.

6 0
3 years ago
If a device does not require a driver, it is _____.
xxTIMURxx [149]

Answer:

(B) plug and play

Explanation:

If a device does not require a driver, it is <u>plug and play</u>. Plug and Play (PnP) is a combination of hardware and software support that enables a computer system to recognize and adapt to hardware configuration changes with little or no intervention by a user, including the loading of appropriate drivers.

7 0
4 years ago
in python i wrote a function where if the user inputs a certain word the function repeats over again, since the function aaks fo
Colt1911 [192]
Check out the counter set
4 0
3 years ago
3.1.2 Quiz: What Can Information Technology Do for You? Question 8 of 10 What is one reason why a business may want to move enti
balu736 [363]

Answer:

C. To focus on a global market

Explanation:

Information technology can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.

An information technology interacts with its environment by receiving data in its raw forms and information in a usable format.

Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information technology and systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information technology and systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.

Additionally, an information system or technology comprises of five (5) main components;

1. Hardware.

2. Software.

3. Database.

4. Human resources.

5. Telecommunications.

Hence, information technology or system relies on the data it receives from its environment, processes this data into formats that are usable by the end users.

One reason why a business may want to move entirely online is to focus on a global market through the use of social media platforms and networks to reach out to customers in various geographical location.

5 0
3 years ago
Other questions:
  • Select the correct statement(s) regarding digital baseband modulation.
    7·1 answer
  • Shortcuts can help you complete spreadsheet tasks more efficiently. True False?
    7·2 answers
  • Will an email sent from a phone say it was sent from your phone
    5·2 answers
  • Which one of the following business names would be rated Incorrect for name accuracy? Answer McDonald's McDonald's H&amp;M McDon
    14·1 answer
  • A difference between crt monitors and flat-panel displays is that most flat-panel displays use digital signals to display images
    8·1 answer
  • What is the basic difference between a printer and a plotter?​
    12·1 answer
  • List 5 anti-virus products currently in use
    15·1 answer
  • My feelings alwayss T-T
    14·2 answers
  • How to shutdow computer
    7·1 answer
  • Question 7 Consider the following code:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!