1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
2 years ago
5

Describe risk avoidance. Name three common methods of risk avoidance.

Computers and Technology
1 answer:
kondaur [170]2 years ago
6 0
Risk avoidance is an approach that eliminates any exposure to risk that poses a potential loss

medical care, fire departments, night security guards, sprinkler systems, burglar alarms
You might be interested in
You are flying an aircraft equipped with an electronic flight display and the air data computer fails. What instrument is affect
Makovka662 [10]

Answer:

cause loss of power, excessive oil consumption, and possible permanent internal engine damage.

Explanation:

4 0
3 years ago
January 19/May 16 2022
fenix001 [56]

Answer:

This should get you started. Many things could be improved. You could keep adding layers to this program if you wanted to, so I wrote it with that in mind.

The new salary depends on the employee's department and current salary. I created a class that represents each employee. The function looks at the employee's current salary, and looks up what the employee's department raise will be (using the dictionary/hash table) before performing the calculation.

3 0
2 years ago
What is the name for the size and style of text?
Mashcka [7]

Answer:

Font

Explanation:

4 0
3 years ago
Read 2 more answers
This is a quick and easy program that will let you practice the basics of the switch statement. You will ask the user to enter a
Nikolay [14]

Answer:

Explanation:

oof okay

5 0
3 years ago
The best way to ensure the accuracy and safety of your accounts is to:
Gekata [30.6K]
Use symbols and a different password for each one

6 0
3 years ago
Other questions:
  • _________ is the amount of data a storage device can move per second from the storage medium to ram.
    12·1 answer
  • What are the changes in ios 14.2? What are the benefits of the ios developer program? What is next for Apple? Base your answers
    14·1 answer
  • CJ is developing a new website blogging about cutting-edge technologies for people with special needs. He wants to make the site
    8·1 answer
  • To add a row labeled "total" to a query design click the ____ button in the show/hide group on the design tab on the ribbon.
    14·2 answers
  • What is the first document that colleges review when making admissions decisions
    10·2 answers
  • Consider the following code: public static void mystery(int a) { System.out.println("A"); } public static void mystery(double a)
    6·1 answer
  • Write a Java program that prompts the user for an int n. You can assume that 1 ≤ n ≤ 9. Your program should use embedded for loo
    5·1 answer
  • What is the relationship between data, information, business intelligence, and knowledge?
    10·1 answer
  • An intruder with malicious intent breaks into an office and steals a hard drive containing sensitive information about the compa
    5·1 answer
  • Help me. thank you very much
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!