Answer:
Risk management is the technique that is used for managing the risky situation so that security of the system or organization can be maintained. The risk can be reduced by parameters like monitoring the system,alertness, preventive measures etc. There are terms related with the risk management for prevention of the risk such as risk control ,risk identification and risk assessment .
- Risk control is the method that is used for calculating the loss or damage experience and then taking the correct measures to reduce the loss and thus, controlling the risk.
- Risk assessment is the analyzation of the threats and source of damage/loss that is caused or can be caused by assessing the whole process and functioning.
- Risk identification is the technique through which the threat is listed over a document and sorted in accordance with the category of risk, risk response etc.
The protocol that should be implemented is that one needs to enable hosts on the network to find the IP address.
<h3>What is IP address?</h3>
It should be noted that IP address simply means a unique address that defines a device on the internet.
In this case, the protocol that should be implemented is that one needs to enable hosts on the network to find the IP address.
Learn more about IP address on:
brainly.com/question/24930846
#SPJ12
Answer:
<h3>Connector names are written below Picture vise:</h3>
<h3 />
Explanation:
Following is the brie Illustration of the terms used:
It is the newest connector in the market with the reversible/symmetrical design. It can be adapted to work with the legacy connectors such as USB-A, USB-B, USB-C and Micro USB.
It is used mostly in the connections of electronic devices such as printers and smartphones. It has A to B connectors as well as micro USB connectors and mini USB connectors.
It is used for the connection o compact devices such as smartphone and mp3 players. They are further grouped into three categories: Micro A, Micro B and micro USB 3.
<h3>
I hope it will help you!</h3>