1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yan [13]
3 years ago
14

In risk management what does risk evaluation involved

Computers and Technology
1 answer:
VLD [36.1K]3 years ago
5 0

Answer:

Explanation:Risk management is the decision-making process involving considerations of political, social, economic and engineering factors with relevant risk assessments relating to a potential hazard so as to develop, analyze and compare regulatory options and to select the optimal regulatory response for safety from that hazard.

You might be interested in
How would you like your social media profiles/personas to be treated in the event of your death? why?
White raven [17]
Depends on the person really. personally i would like it all to be kept for memories but never used anymore
7 0
3 years ago
Read 2 more answers
May someone help please. :(
BigorU [14]

the 3rd one, if you ever watched a dvd (i know you have) if you read the copyright note you can be fined and you may end up in jail (for five or two years depending on what you did)

7 0
4 years ago
Which of these sedimentary rocks is made of the largest particles?
Marta_Voda [28]
Your answer is <span>A.conglomerate.

Hope this helps :)</span>
6 0
4 years ago
On many advanced routers and switches, you can implement QoS through bandwidth management, such as __________, where you control
Mila [183]

Answer:

c. traffic shaping

Explanation:

A traffic shaping system is one that allows to adapt the incoming data traffic that comes from some node of the network giving it a special treatment called conformation of accepted traffic and thus allowing the frames to be forwarded through the network of data under traffic rules without having gone through some traffic shaping method, this can be detected as non-conforming traffic at the edge of access to the discarded metropolitan network.

Traffic shaping is a mechanism that alters the traffic characteristics of the cell flow of a connection to achieve better network efficiency while maintaining QoS objectives or in order to ensure that the cell flow conforms to traffic parameters according to the leaky bucket algorithm configuration of the traffic contract. Traffic shaping can be used in ATM, for example, to reduce peak speed, limit the length of the burst by means of adequate spacing of cells over time. The use and location of this function is network specific.

5 0
3 years ago
What's the maximum number of ad extensions that can show for a particular query or device at any given time?
krok68 [10]

Answer:

Four (4) extensions.

Explanation:

Go-ogle Ads can be defined as a strategic advertising platform designed and developed by Go-ogle for use over the internet. It can be used to display product listings, services and campaigns to any web user over the internet.

Basically, for those who are relatively new to the Go-ogle Ads, the company provides a feature known as the dynamic search ads which helps various users to easily run a successful ad campaign. Through the use of machine learning, a dynamic search ad allows phrases and titles associated with a website to be automatically indexed and presented as a landing page to any user who is searching with the keywords.

The maximum number of ad extensions that can show for a particular query or device at any given time is four (4) extensions. The Go-ogle Ad extension platform is designed to display all the ads simultaneously or co-trigger and as such, the maximum number of ad extensions that are displayed per query or device are four (4).

4 0
3 years ago
Other questions:
  • Convert the following binary numbers to decimal numbers. (Show your work) a. 110110 b. 100111 c. 101101
    6·1 answer
  • Although highly accurate navigational information from the GPS constellation is exploitable by adversary forces, it is unlikely
    5·1 answer
  • How can rows be added to a table​
    5·1 answer
  • Which task should happen during the planning stage of a project? reflect on the project outcomes prevent set-backs determine the
    11·1 answer
  • Programs are normally stored in ________ and loaded into main memory as needed. the input device the output device secondary sto
    15·1 answer
  • This component is responsible for the logical order of processing?
    11·1 answer
  • The space that helps you organize your PowerPoint or Web Page is called ______.
    13·1 answer
  • All Office programs have similar commands on the tab for changing the document view a. File b. View c. Locate d. display ​
    5·1 answer
  • You are working on a ticket for a user who cannot access the Internet from their PC. After troubleshooting, how do you confirm t
    10·1 answer
  • What (if any) are the same feature requirements that might be found in server software/OS environments
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!