1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marrrta [24]
3 years ago
15

What is a risk?

Computers and Technology
1 answer:
Leya [2.2K]3 years ago
5 0
The answer should be 
B. Some bad thing that might happen

hope this helps!
You might be interested in
Should spreadsheets be used to maintain a checkbook?<br> YES<br><br> NO
algol [13]

Yes, because it keeps all your data organized and allows you to see the trend and growth of your data by automatically creating different types of charts and graphs to help you visualize your data.

Hope that helps!

7 0
2 years ago
Figuring out why your computer won't turn on falls under diagnosing.<br> A. True<br> B. False
igomit [66]
The answer to your question, is true
hope this helps :D
7 0
3 years ago
Read 2 more answers
Which of the following statements about programmed decisions is FALSE? a. Programmed decisions deal with repetitive situations.
MA_775_DIABLO [31]

Answer:

Option e: The use of programmed decisions should be limited to noncritical situations.

Explanation:

A repetitive decision or routine that can be managed by developed business  procedures or rules are known as programmed decisions. These kind of decisions are most often known for at certain points in a standard process, and are planned relying on recognized and easily identifiable terms. Programmed decisions generally do not demand much consideration or discussion, and can typically be automated to make certain consistency and save time for decision-makers.

So, the use of programmed decisions should not be limited to noncritical situations.

5 0
3 years ago
The process of adding a header to the data inherited from the layer above is called what option below
Tom [10]

Answer:

The correct answer to the following question will be "Encapsulation".

Explanation:

The wrapping of the data into a single unit or the method by which a header is applied to the data inherited from the above layer is termed as Encapsulation.

While relating to networking, encapsulation would be the method of storing and converting data through one protocol into another, so that the data can proceed over a network. A TCP/IP package contained under an ATM system, for example, is indeed a kind of encapsulation.

Therefore, Encapsulation is the right answer.

4 0
3 years ago
The safest action to take if someone claiming to be from your banks calls you to ask for account information is to
aalyn [17]
<h2>Answer:</h2>

<u>The correct option is</u><u> (B) hang up and call back using the banks official phone number</u>

<h2>Explanation:</h2>

There are a lot of cases where people pretend to call from the banks where the receivers have the account. The caller tries to take the information from the receiver and pretends to be the bank official. If there is any doubt then the receiver should hang up the call and call back the official number of the bank to confirm that whether somebody has called from the bank to get the information.

8 0
3 years ago
Read 2 more answers
Other questions:
  • What specific type of DNS query instructs a DNS server to process the query until the server replies with an address that satisf
    5·1 answer
  • Jack lost all the data he saved on his desktop because of a power outage while working on a presentation on which of these compu
    10·2 answers
  • I need help for preparing for a presentation. Can someone give me advice so I don't have a panic attack again?​
    11·2 answers
  • Which of the following would be considered the highest risk portfolio?
    9·1 answer
  • Is Missouri a free state or a slave state​
    13·2 answers
  • বর্তমান করােনার ন্যায় পরিস্থিতি অর্থাৎ স্বাভাবিক শ্রেণি কার্যক্রম পরিচালনা সম্ভব
    10·2 answers
  • 1.The ___________ method adds a new element onto the end of the array.
    5·1 answer
  • Write at least and explain four types of escape sequences and create an example in an IDE which consist of the mentioned escape
    7·1 answer
  • if you dont' have access to nessus, which of the following can be used by an attacker to gain information about remote *nix host
    11·1 answer
  • Submit a report outlining the steps you will take to obtain digital evidence. In your report you must include the legal requirem
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!