1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
2 years ago
5

Describe risk avoidance. Name three common methods of risk avoidance.

Computers and Technology
1 answer:
kondaur [170]2 years ago
6 0
Risk avoidance is an approach that eliminates any exposure to risk that poses a potential loss

medical care, fire departments, night security guards, sprinkler systems, burglar alarms
You might be interested in
What are the best 3 xbox 360 games ?​
Andru [333]
Halo
GTA
Call of duty
5 0
4 years ago
Read 2 more answers
_______________ provides options for getting access to your old password or resetting the account to a temporary password; users
gtnhenbr [62]

Answer:

account recovery

Explanation:

account recovery, provides options for getting access to your old password or resetting the account to a temporary password; users will change to a permanent password upon first login.

3 0
2 years ago
Enzymes_____________.
lord [1]

Answer:

b. speed up chemical reactions.

Explanation:

brainly plz

4 0
3 years ago
What is the distinction between a network and an internet?
kompoz [17]
Hi,

Network: Is group of computers connected together via communications devices and transmission media.

Internet: Is a worldwide collection of networks that connect Governments, Businesses, Institutions and Individuals thought their personal devices.

Hope this helps.

r3t40
8 0
3 years ago
Dave wants to host a website and he needs an operating system that is free of cost. Which operating system should he use? a MS D
Zigmanuir [339]
It is microsoft windows
8 0
3 years ago
Read 2 more answers
Other questions:
  • A layer of control in each communicating device that provides functions such as flow control, error detection, and error control
    13·1 answer
  • Which is a feature of a strong thesis statement? A) It presents only the facts. B) It is open-ended. C) It answers the central q
    15·1 answer
  • A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to sever
    7·1 answer
  • Suppose you are consulting for a bank that's concerned about fraud detection, and they come to you with the following problem. T
    13·1 answer
  • Fedora operating system
    9·1 answer
  • Which Numpy function do you use to create an array? (Points : 1) np
    5·1 answer
  • Paul has been working long hours. He is tired and distracted by family issues,
    10·1 answer
  • python An instance variable named counter of type int An instance variable named limit of type int. A constructor that takes two
    15·1 answer
  • It is impossible to use a computer without a mouse. Is this statement true or false?
    10·1 answer
  • Which objects appear on the slide after she clicks OK? Check all that apply.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!