1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marin [14]
2 years ago
10

Mark and his team are working on a project that is due for delivery in the next few days. The team is using project management t

ools to implement a set of new client requirements. Which activity are Mark and his team performing? A. managing integration B. managing change C. managing quality D. managing timelines
Computers and Technology
1 answer:
meriva2 years ago
7 0

Answer:

The correct option is;

B. Managing change

Explanation:

Change management is a process of applying methods and instruments that bring about the implementation of required changes in an organization or project such that the changes are carried out in a seamless and timely manner using a carefully laid out and thorough approach that reduces the impact of the change on the quality of service and that handles the disruptions in the project or organization brought about by the change

You might be interested in
The Open Systems Interconnection (OSI) Reference Model: defines standards for many aspects of computing and communications withi
Advocard [28]

Answer:

is a generic description for how computers use multiple layers of protocol rules to communicate across a network.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer.

2. Data link Layer.

3. Network Layer.

4. Transport Layer.

5. Session Layer.

6. Presentation Layer.

7. Application Layer.

Hence, the Open Systems Interconnection (OSI) Reference Model is a generic description for how computers use multiple layers of protocol rules to communicate across a network.

Additionally, each layer has its unique functionality which is responsible for the proper functioning of the communication services.

8 0
2 years ago
What is used for risk response control?
miskamm [114]

Answer:

Risk response control uses methods such as mitigate, avoidance, shift, actively accept, and passively accept.

Explanation:

Risk Response Control refers to the procedure of evaluating residual risks, detecting new risks, guaranteeing the execution of risk plans, and assessing the success of the plans in decreasing risk is known as risk response control. Whereby the risk response control techniques include acceptance, avoidance, transfer, and mitigation

6 0
1 year ago
It is good practice, however, for policy _________________________ to solicit input both from technically adept information secu
s2008m [1.1K]

Answer:

It is good practice, however, for policy <u>Administrator </u>to solicit input both from technically adept information security experts and from business-focused managers in each community of interest when making revisions to security policies.

<u>Explanation</u>

Administrator is the person who has access to each part of the computer. Ha has rights to revise, add or edit application. The administrator is authorized to make and implement policies that are for the interest of the community.

7 0
3 years ago
Q2
rosijanka [135]

Answer:

Computer is a electronic device which give us accurate result in a short preodical of time

6 0
2 years ago
Read 2 more answers
How does the zone theory of optical systems resolve the apparent incompatibility of trichromacy and opponency?
lara [203]

Answer:

Money money money

Explanation:

4 0
3 years ago
Other questions:
  • Why is a DNS cache poisoning attack dangerous? Check all that apply. A. Errrr...it's not actually dangerous. B. It allows an att
    12·1 answer
  • Create a public non-final class named Streamer. You should implement one class method: filterStrings. It should accept a single
    8·1 answer
  • Good afternoon guys !!!
    14·2 answers
  • Advantages of e commerce
    14·1 answer
  • The famous study entitled ""Protection Analysis: Final Report"" focused on a project undertaken by ARPA to understand and detect
    14·1 answer
  • In a study on software license infringement, those from United States were significantly more permissive than those from the Net
    15·1 answer
  • Which of the following is an accurate definition of a computer system? A computer system consists of the operating system that t
    6·1 answer
  • What is the purpose of a system call in an operating system?
    10·1 answer
  • As technology advances, does technology become more of less complex?
    14·1 answer
  • The physical layer of the OSI model is not foundational to any of the other layers. True or False
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!