1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetradugi [14.3K]
3 years ago
14

Of the sequences listed below, which shows the correct order of the steps in the incident management workflow: (1) authenticate

the incident, (2) archive the incident, (3) log the incident, and (4) prioritize the problema. 4 – 3 – 1 – 2b. 3 – 1 – 2 – 4c. 1 – 3 – 4 – 2d. 1 – 2 – 3 – 4
Computers and Technology
1 answer:
slega [8]3 years ago
3 0

Answer:

C.

Explanation:

In the Incident Management Workflow , first you Authenticate the incident; Then log the incident. Then prioritize the problem; and then archive the incident.

Thus, 1 - 3 - 4 - 2

Cheers

You might be interested in
What type of code do computers typically use to operate? A. CSS B. HTML 5 C. HTML D. Binary
Rufina [12.5K]

Answer:

Pretty Sure its Binary

Explanation:

HTML is used for websites.

4 0
3 years ago
Read 2 more answers
What is the relationship between agile teams and project requirements
spin [16.1K]

Answer:

Agile follows a non-linear process, unlike conventional project management, which focuses more on teamwork, cooperation, and versatility, as opposed to a strict sequence of activities.Agile project management takes an iterative approach to project management, which time-boxes tasks into fast sprints.

Explanation:

4 0
3 years ago
How would you justify using cloud computing?
podryga [215]

Cloud Computing

Explanation:

1.Cloud computing allows employees to be more flexible in their work practices. For example, you have the ability to access data from home, on holiday, or via the commute to and from work (providing you have an internet connection).

2.Network capabilities are extended without requiring investment in new infrastructure, personnel, or software. Technology is integrated into every-day appliances allowing them to interconnect with other devices, making them more 'smart' or automated.

3.Cloud computing benefits

  • Efficiency / cost reduction. By using cloud infrastructure, you don't have to spend huge amounts of money on purchasing and maintaing equipment.
  • Data security.
  • Scalability.
  • Mobility.  
  • Disaster recovery..
  • Control.
  • Competitive edge.

4.Cloud environments promise several benefits such as reduced expenses and simplicity to ser- vice providers and service requesters [Foster et al. ... 2010], trust management and security are ranked among the top 10 obstacles for adopting cloud computing

6 0
3 years ago
Develop a program that will calculate the area and perimeter of a rectangle. The length and width can be given as constant.(LENG
o-na [289]

Answer:

#include <iostream>

using namespace std;

int main()

{

 

  int length = 8;

  int width = 8;

 

  int perimeter = 2*(length + width);

  int area = length * width;

 

  cout<<"The perimeter is "<<perimeter<<endl;

  cout<<"The area is "<<area<<endl;

 

  return 0;

}

Explanation:

include the library iostream for using the input/output instructions in the c++ programming.

Create the main function and define the variable length and width with values.

Then, use the formula for calculating the perimeter and area of rectangle.

perimeter = 2*(length + width)

area = length * width

and store in the variables and finally print the output.

8 0
3 years ago
To find information on a network use a ____
igomit [66]

Answer:

circuit

Explanation:

4 0
2 years ago
Other questions:
  • What aspect of the internet makes it fault-tolerant?
    6·1 answer
  • Philip is thinking about customizing his motorcycle. A paint job, saddlebags, and a radio would cost $600. His motorcycle is old
    15·2 answers
  • In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-p
    15·1 answer
  • Which one of the following items is an example of software?
    12·2 answers
  • "What is the database in which Windows stores all information about hardware, applications, users and system settings?"
    8·1 answer
  • What is one pass of a coding sequence called?​
    13·2 answers
  • Alexi is writing a program which prompts users to enter their age. Which function should she use?
    6·2 answers
  • Which memory can be removed from motherboard? RAM OR ROM?​
    11·1 answer
  • நெறி என்னும் சொல்லின் பொருள்___ *​
    14·1 answer
  • How did the military in the early 1900s move resources?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!