1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melamori03 [73]
2 years ago
8

When doing a Risk assessment, what is one of the most important things to do?

Computers and Technology
2 answers:
GaryK [48]2 years ago
8 0

Answer:

Determine who might be harmed and how.

Vaselesa [24]2 years ago
5 0

Answer:to concentrate and not talk to others

Explanation:be only to your self and not talk to others

You might be interested in
Is wireless or wired network faster??
bogdanovich [222]

Answer:

Wired

Explanation:

3 0
3 years ago
Read 2 more answers
1a. Ust Seven (7) Components of a Computer?
san4es73 [151]

Explanation:

1a. i know only 4 components of computer these are users, data,hardware & software

1b.users,the person who use the computer

data,it is the collection of raw facts and figures

hardware,is the physical part of the computer that can be seen and touch

software,is a set of program that instruct the computer to perform the certain action

2a,an internet is worldwide systen of interconnected computer network

2b.if some student want to now about something he can use internet and get the answer,to commenicate with others,and to learn online

8 0
2 years ago
One reason to buy a home instead of rent a home is:
vazorg [7]
A is the correct Answer

7 0
4 years ago
Which is a common problem caused by the widespread use of computers?
Andru [333]
Hacking would be a widespread problem.
8 0
4 years ago
What two names are given to the blinking vertical line?
Paha777 [63]

Answer:

<u>see </u><u>below</u><u>:</u>

Explanation:

One is (the cursor).

Whenever you see a flashing vertical line called-the cursor--you can start typing.Note that the mouse pointer is also called a cursor,but it is shaped differently.The keyboard cursor is also called the insertion point.

5 0
3 years ago
Other questions:
  • ___ are limited computers because they are placed inside devices which require specific computing functions
    11·1 answer
  • Together, what do the divisions of the DHSMV do?
    12·1 answer
  • When you arrive at work one morning, your inbox is full of messages complaining of a network slowdown. you collect a capture fro
    12·1 answer
  • Which of the following techniques would a Baroque composer most likely employ to evoke an affect of agitation? Select one:
    14·1 answer
  • What is one of the differences between Random Access Memory (RAM) and Read Only Memory (ROM)? RAM is where files are stored, and
    6·2 answers
  • During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modification
    9·1 answer
  • An example of computer hardware is ? A. keyboard B. app C. web browser D. operating system
    13·2 answers
  • Regardless of if you use social media or not, would you rather be conservative rather than outgoing on social media? Why or Why
    13·1 answer
  • What is ‘situational awareness” in game design?please answer in a full sentence!
    10·1 answer
  • an engineer is writing a web application that requires some user input. the engineer has put a submit button on their page and n
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!