1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
STatiana [176]
3 years ago
10

Who needs to approve a change before it is initiated? (Select TWO.)

Computers and Technology
2 answers:
Minchanka [31]3 years ago
4 0

Answer:

The correct answer would be options B and E. Client or end user and Project Manager.

Explanation:

If you are developing a system for a client, to be used by him individually or on a company level, then everything in it are developed according to the needs and demands of that client, and if there is a need to make a change in the system, then this change cannot be initiated until and unless asked by the client to change it. Secondly, it is also important to take a go ahead from the project manager because he will better understand the limitations and can better tell about whether to make a change or not. So these both parties are crucial before initiating change in the system.

vivado [14]3 years ago
3 0

Answer:

Change board

Project Manager

Explanation:

Many organizations lack clarity about whose responsibility it is to approve the project change requests. Various positions from the project sponsor to the senior management gets involved. However, there are three people in an organization who can approve.

Project Sponsor – He is typically the senior leader of an organization and is authorized to make project decisions

Project Manager – He is able to integrate all the facets of the project due to his intimate knowledge of the project

Change Control Board – They include key stakeholders that may either review change requests for all projects or individual programs.

You might be interested in
Which term describes encryption that protects the entire original ip packet's header and payload?
mario62 [17]
The answer is <span> tunnel mode encryption.   This</span><span> describes encryption that protects the entire original ip packet's header and payload.  A tunnel mode encryption </span><span>protects the internal routing information by encrypting the IP header of the original packet. The original packet is encapsulated by a another set of IP headers. .<span>Additional headers are added to the packet; so the payload MSS is less.</span></span>
7 0
3 years ago
Read 2 more answers
Which toolbar is located next to the office button and contain the commonly used commands​
Andrei [34K]

Answer: Quick Access Toolbar

The Quick Access Toolbar is located to the right of the Microsoft Office Button . It contains commands that are used most often, for example Redo, Undo and Save.

Explanation:

7 0
4 years ago
What department is cyber security
Paul [167]

Answer:

United States Department of Homeland Security

The National Cyber Security Division (NCSD) is a division of the Office of Cyber Security & Communications, within the United States Department of Homeland Security's Cybersecurity and Infrastructure Security Agency.

<em>Give</em><em> </em><em>me</em><em> </em><em>brainliest</em><em> </em>

8 0
3 years ago
Read 2 more answers
5. What is the number one cause of accidents in the classroom, office, and home?
sp2606 [1]

Answer:

Lack of safety in technology and structures.

4 0
4 years ago
Globalization is the trend A) of the world economy becoming a less dependent system. B) of the world economy toward becoming a m
mojhsa [17]

Answer:

B) of the world economy toward becoming a more interdependent system.

Explanation:

Globalization refers to the process of international trade which brings people, companies together for the sole aim of exchanging goods, services, capital, knowledge across international borders.

This process of interaction makes people to get closer and increase international cooperation.

4 0
3 years ago
Other questions:
  • There are 10 red apples and 12 green apples in a basket. If Vinta randomly selects 3 apples from the basket, what is the probabi
    15·1 answer
  • Which of the following would be an example of a loss of record integrity in a
    12·1 answer
  • When people take a image on their phone how can they copy the image into google docs.
    6·2 answers
  • Given the following code fragment, how many times does the loop body execute? int laps = 50; int myNum = 1; do { myNum = myNum +
    9·1 answer
  • How many bytes of information can be stored on a hard drive?
    7·1 answer
  • In which of the following situations should you expect to provide your Social Security number?
    13·1 answer
  • Write motivation of cache memory​
    9·1 answer
  • PLEASE HURRY PLEASE HELP THIS CLASS ENDS TODAY AND I NEED HELP
    7·1 answer
  • They will wash the car change into tag question​
    6·1 answer
  • Software that uses signature-based detection contains a library of signatures of known _____?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!