subject

Ateam wants to set up a computer lab for their library. members would be able to access and read books using the computers in the library. after researching about risks, they decide to install only desktop computers instead of tablets. this strategy might prevent the risk of computers being stolen. which risk management technique are they following? a.) risk acceptance b.) risk mitigation c.) risk avoidance d.) risk transfer

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 23:30
A. in packet tracer, only the server-pt device can act as a server. desktop or laptop pcs cannot act as a server. based on your studies so far, explain the client-server model.
Answers: 2
question
Computers and Technology, 24.06.2019 03:30
It is not necessary to develop strategies to separate good information and bad information on the internet. true or false
Answers: 1
question
Computers and Technology, 24.06.2019 11:00
Why is it uncommon for users to perform searches directly in database tables? a.)users are discouraged from interacting directly with tables because they might confuse tables with spreadsheets. b.) users are discouraged from interacting directly with tables because this may result in unintended changes to source data. c.)users do not have the technical skills required to perform searches directly in database tables. d.)users do not have the permissions required to perform searches directly in database tables.
Answers: 1
question
Computers and Technology, 24.06.2019 15:30
What is the total number of time zones that can be configured to show by default in a calendar in outlook 2016?
Answers: 1
You know the right answer?
Ateam wants to set up a computer lab for their library. members would be able to access and read boo...
Questions
question
Mathematics, 24.06.2019 23:40
Questions on the website: 13722362