I believe d. be in something easy to carry.
Answer:
A. Encryption
Explanation:
The <u>encryption</u> mechanism helps mitigate the malicious intermediary, insufficient authorization, and overlapping trust boundaries security threats, it also helps secure remote message exchanges between consumers by protecting the privacy of message data thus making it inaccessible by hackers.
Answer:
i honestly think its c but i wouldn't answer yet because i'm not entirely sure
Explanation:
Answer: critical chain method
Explanation:
Critical chain method is a technique that modifies the project schedule to account for limited resources by addition of duration buffets that are non-work schedule activities to maintain focus on the planned activity durations.
Answer:
d
Explanation:
<em>H</em><em>EY </em><em>IT'S</em><em> </em><em>BY </em><em>OWN </em><em>OPINION</em><em>.</em>
<em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em><em>.</em>