1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
2 years ago
5

Describe risk avoidance. Name three common methods of risk avoidance.

Computers and Technology
1 answer:
kondaur [170]2 years ago
6 0
Risk avoidance is an approach that eliminates any exposure to risk that poses a potential loss

medical care, fire departments, night security guards, sprinkler systems, burglar alarms
You might be interested in
Identify an advantage of the software as a service (SaaS) approach in public cloud computing. Group of answer choices The user h
adell [148]

Answer:

The user does not need to purchase and install additional hardware to provide increased capacity.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it. Some examples of SaaS are Go-ogle apps, Bigcommerce, Salesforce, Slack, Dropbox, DocuSign, Microsoft Office 365, etc.

An advantage of the software as a service (SaaS) approach in public cloud computing is that the user do not have to purchase and install additional hardware to provide increased capacity because the software provider makes all of the necessary features for smooth operations and proper functioning available to the user.

7 0
2 years ago
Question 3 of 10
kvv77 [185]

Answer:

B. Sometimes, seeing a picture of the process is more helpful than  reading about it.

Explanation:

Video tutorials are a form of communication in which the instructions are given through video instructions. The users drive more information from video tutorials than written or audio. The visual and the auditory aids together helps in creating a better impact on the users. The video tutorial is more user friendly and can easily be controlled by the user. This helps in better understanding and analyzing the information.

8 0
3 years ago
A person interested in a career in digital media should have which qualities? Select all that apply.
emmainna [20.7K]
1.Creativity
2.Leadership
3.Attention to detail
5.Enjoyment to learning new things!
6.Vision
No Problem!
5 0
2 years ago
Within a single program, __________________ allows multiple parts, or threads, to run simultaneously.
jekas [21]
<span>It should be single-user/multitasking os.</span>
4 0
3 years ago
Which best describes the benefits of renting a home?
arlik [135]
The benefit of actually growing up.
5 0
3 years ago
Other questions:
  • What is TCP/IP's Transport layer's primary duty?
    8·1 answer
  • In three to five sentences, describe how technology helps business professionals to be more efficient. Include examples of hardw
    10·1 answer
  • "what should you do if the system continually reboots and you can't read the error message produced on a blue screen
    11·2 answers
  • What are the most popular/up-and-coming social media applications?
    10·2 answers
  • In the written Hawaiian language, only 13 letters are used: the five vowels (a,e,i,o, and u), and 8 consonants (h,k,l,m,n,p,w, a
    10·1 answer
  • List and describe the tools for all the main stages of app/application development.
    11·1 answer
  • In the game of $Mindmaster$, secret codes are created by placing pegs of any of seven different colors into four slots. Colors m
    5·1 answer
  • Vices for a research paper
    6·1 answer
  • Why is the Microsoft website considered the best source for information about pagefile.sys?​
    15·1 answer
  • What is boot sector virus​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!