Answer:
C.
Explanation:
In the Incident Management Workflow , first you Authenticate the incident; Then log the incident. Then prioritize the problem; and then archive the incident.
Thus, 1 - 3 - 4 - 2
Cheers
C hope that helps have a good day and I feel you good for big hugs
False, software obtained illegally is called Pirated Software.
<span>Open source software is software developed by and for the user community, ie. Linux based software is Open Source.</span>