______are unplanned responses to risk events used when project teams do not have contingency plan in place.A) Workarounds.
B) Fallback plans.
C) Contingency plans.
D) Triggers.

Answers

Answer 1

Answer:

B) Fallback plans.  

Explanation:

Fallback plan: The term "fallback plan" is described as a backup plan that is being related to the contingency plan. Thus, it comes into consideration when the contingency plan is being failed to get implemented ans similarly when the fallback plan failed to work then the contingency plan comes into consideration.

In the question above, the given statement represents the fallback plans.


Related Questions

Discuss a particular type of Malware and how has it been used in "todays news" and the respective impact on cyber security. Add to your discussion ways the Malware could have been detected and potentially avoided.

Answers

Answer:

Trojan Malware

Explanation:

Trojan horse malware is considered to be one of the most famous computer malware or virus right now. This type of malware is used to fool or trick a user into downloading some malicious software or any file. These attacks are then done by the cyber criminal who can access your system for can get your private credentials.

They send an fake email or a link and by clicking on this fake link, the cyber criminal get access to our computer from where he can access our confidential credentials.

Such a type of cyber attack can be controlled if the employees of the organisation are been educated regularly about the potential threats of these type of malware. Care should be taken not to download file from any un-trusted websites or emails.

What is the key function provided by a network

Answers

Answer:

A  key Network Function (NF) of SBA is the Network Repository Function (NRF), which provides NF service registration and discovery, enabling NFs to identify appropriate services in one another.

hope this helps

Explanation:

Why computer is known as data processing system?

Answers

Computer is known as data processing system because it changes raw data that is not in useful form such as tables, figures, etc into processed data known as information that is useful. Processing includes manipulating, storing, accessing, and transmitting.

In no less than two paragraphs, explain the risks and compliance requirements of moving data and services into the cloud.

Answers

Answer:

Compliance requirements of moving data and services into the cloud:

In other to use cloud services, one has to comply or follow the rules of the service providers, the country of the location where these services are provided. All these are necessary for the safety of the data stored in the cloud.

Some countries, regions, often set up rules guarding usage and storing data in the cloud. So it is very important to be aware of this. For instance, some countries enforce data localization laws which make data of its citizen stored in the servers of the country. Here, the country has full protection over the data hosted.

There are also data sovereignty laws that give the country hosting the data a sort of authority to exercise in accordance with the law binding cloud data hosting in their region. This gives the country easy access to information in case of any legal means.

So, when choosing a cloud application, it’s important for an organization to select an application that will aid in cloud compliance and improve your security posture, not create more risk.

It is very important to first know which law is applicable to the country one is residing so as to comply with cloud usage to avoid fines and legal cases.

Risks of moving data and services into the cloud

It is good before using cloud services to know who could possibly have access to the data, if it is safe, how long could data be stored.

If there are unauthorized use of cloud services, the organization providing the service might not be aware of the safety of the hosted data which eventually decreases an organization's visibility and control of its network and data.

Data stored in the cloud could become incomplete, stolen, lost.

The client might not be able to control who else has access to the stored data.

Moving data and services into the cloud could become unattractive again as organizations could lose clients and revenue if clients' trust no longer exists.

What is the value of the variable index after the Python code below is executed? word = 'bAnana' index = word.find('a')

Answers

Answer:

index = 3

Explanation:

the find() function finds the first instance of a letter or word.

'b' = 0

'A' = 1

'n' = 2

'a' = 3

'n' = 4

'a' = 5

the first instance of 'a' in  "bAnana" is found at index location 3 computer scientist start counting from zero.

The index value of "a" in python code is "3".

Program Explanation:

In the given code, a variable "word" is declared that initializes with a string value that is "bAnana".In the next line, an "index" variable is defined that uses a "word" variable with the find method that prints the index value of "a".Using the print method, that prints the "index" value.

Program:

word = 'bAnana' #defining a variable word that initializes with string value

index = word.find('a')#defining a variable index that calls the find method to print index value of a

print(index)#print index value

Output:

Please find the attached file.

Reason for the output:

Since the array of indexing starts with 0 so, the index value of "a" is "3".  

Learn more:

brainly.com/question/13437928

In which of the following careers must one learn and use programming languages?

Answers

Answer: any job that has programming in it

How should you handle cyberbullies?

Answers

Answer:

insult those son of a bishes backk

i would ✨punch them ✨

If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’re E-business. Do you think that cookies are stored and maintain such information on the server-side and hackers can't steal user's information from these cookies easily? Do you agree with the above statement? Please give short comments in favor of or against the statement.

Answers

Answer:

cookies are stored on client side.

A hacker would need access to your computer, either by physically reading the cookie data or by means of cross-site scripting.

Other than that, cookies should not contain passwords or credit card numbers, just things like preferences or session identifiers.

if someone has become very attached to their device and feels anxious if they cannot connect to the internet what are they experiencing

Answers

Answer:

anxiety or depression

Explanation:

Because if you like an device if you get get it you get sad and sad and sadder

Write a program that prompts users to pick either a seat or a price. Mark sold seats by changing the price to 0. Use overloaded methods to implement seat allocation: When a user specifies a seat (row, column), make sure it is available. When a user specifies a price, find any seat with that price. Write appropriate responses to the user if the seat is already taken, if their seat is available, or the seat number of the assigned seat if they just specified a price, etc.
A theater seating chart is implemented as a two-dimensional array of ticket prices, like this:_______.
10 10 10 10 10 10 10 10 10 10
10 10 10 10 10 10 10 10 10 10
10 10 10 10 10 10 10 10 10 10
10 10 20 20 20 20 20 20 10 10
10 10 20 20 20 20 20 20 10 10
10 10 20 20 20 20 20 20 10 10
20 20 30 30 40 40 30 30 20 20
20 30 30 40 50 50 40 30 30 20
30 40 50 50 50 50 50 50 40 30

Answers

Answer:

Answer is given in the attached document.

Explanation:

Explanation is given in the attached document.

Answer:

i do not know

Explanation:

When working in an application and the user saves their work, sometimes at the bottom of the window, a progress bar will indicate show the progress of the save operation. This is an example of what?​ a. ​ Active discovery b. ​ Provide closure on a dialogue or action. c. ​ Saving the user’s work d. ​ Affordance

Answers

The correct answer is B provide closure

In Microsoft Excel, which statement is not a recommended guideline for designing and creating an Excel table? Avoid naming two fields with the same name. Ensure no blank columns separate data columns within the table. Leave one blank row between records in the table. Include field names on the first row of the table.

Answers

Answer:

Leave one blank row between records in the table.

Explanation:

In Microsoft Excel application, there are recommended guidelines for designing and creating an Excel table, to carry out some operations, some of which are:

1. Do not use two fields with the same name.

2. Users should make sure there are no blank columns separate data columns within the table.

3. Incorporate field names on the first row of the table.

Hence, in this case, the statement that is not a statement is not a recommended guideline for designing, and creating an Excel table is "Leave one blank row between records in the table."

does anyone know about the progressive era?

Answers

Answer: The Progressive Era was a period of widespread social activism and political reform across the United States that spanned the 1890s to the 1920s.

Explanation:

I have heard of it but not completely sure

Which system changeover method would you recommend for an air traffic control system upgrade? Explain your answer.

Answers

Answer:

The definition regarding the given concern is outlined in the following part on the clarification.

Explanation:

As a consequence of technological change, organizations continue to update their software management systems. In implementing a traffic support system update, many methods of changeover growing are considered. The Pilot Changeover procedure is ideally among the different procedures of exchange. The process includes testing the device across a minimal scale at an approved site until the commitment to start it in their organization becomes undertaken.After satisfactory testing, the immediate changeover method becomes required to start the device. This approach is also advantageous as it helps the organization to operate the current model parallel towards the previous one although at much significantly cheaper cost than the simultaneous switching system, rendering it more cost-effective. This happens although the device becomes less expensive, this is fewer expensive because around a similar moment it would not encourage the commercial procedures to generate any disruption.

Describe and define each of the following tkinter widgets:
a) Label
b) Entry
c) Button
d) Frame

Answers

Answer:

Tkinter in Python comes with a lot of good widgets. Widgets are standard graphical user interface (GUI) elements, like different kinds of buttons and menus.   Ttk comes with 17 widgets, eleven of which already existed in tkinter:

Button Checkbutton Entry Frame Label LabelFrame Menubutton PanedWindow Radiobutton Scale and Scrollbar

The other six are new: Combobox, Notebook, Progressbar, Separator, Sizegrip and Treeview. And all them are subclasses of Widget.

Explanation:

The Label widget is a standard Tkinter widget used to display a text or image on the screen. The label can only display text in a single font, but the text may span more than one line. In addition, one of the characters can be underlined, for example to mark a keyboard shortcut.Entry widgets are the basic widgets of Tkinter used to get input, i.e. text strings, from the user of an application. This widget allows the user to enter a single line of text. If the user enters a string, which is longer than the available display space of the widget, the content will be scrolled.The Button widget is a standard Tkinter widget used to implement various kinds of buttons. Buttons can contain text or images, and you can associate a Python function or method with each button. When the button is pressed, Tkinter automatically calls that function or method.A frame is rectangular region on the screen. The frame widget is mainly used as a geometry master for other widgets, or to provide padding between other widgets.

The definition of widgets is given:

a) Label - It is a common Tkinter widget that displays text or an image on the screen.

b) Entry - They are the fundamental Tkinter widgets used to collect input, i.e. text strings, from an application's user.

c) Button - it is a Tkinter standard that is used to implement various types of buttons.

d) Frame - it is a rectangle on the screen. The frame widget is primarily used as a geometry master for other widgets or as padding between other widgets.

What are Tkinter widgets?

Tkinter in Python includes a plethora of useful widgets. Widgets are graphical user interface (GUI) elements that include various types of buttons and menus.

The label can only display text in one font, but the text can span multiple lines. Furthermore, one of the characters can be highlighted, for example, to indicate a keyboard shortcut.

Therefore, the definitions of the widgets are given above.

To learn more about Tkinter widgets, refer to the below link:

https://brainly.com/question/17438804

#SPJ2

Why is the unallocated space of a Windows system so important to a forensic investigator?

Answers

Answer:

Unallocated space can potentially contain all of these types of files and evidence, either completely or partially as fragments, which can remain untouched for long periods of time, even years after the deletion or activity. This data and evidence cannot be viewed by an ordinary computer user, but can be recovered and examined with specialized forensic software and the expertise of a forensic investigator .

Hope this helps :))

Write a program that asks the user for three names, then prints the names in reverse order.
Please enter three names:
Zoey
Zeb
Zena
Zena
Zeb
Zoey

Answers

Answer:

The program written in C++ is as follows'

#include<iostream>

using namespace std;

int main()

{

string names[3];

cout<<"Please enter three names: "<<endl;

for (int i = 0; i< 3;i++)

{

cin>>names[i];

}

for (int i = 2; i>= 0;i--)

{

cout<<names[i]<<endl;

}

return 0;

}

Explanation:

This line declares an array for 3 elements

string names[3];

This line prompts user for three names

cout<<"Please enter three names: "<<endl;

This following iteration lets user input the three names

for (int i = 0; i< 3;i++)  {  cin>>names[i];  }

The following iteration prints the three names in reverse order

for (int i = 2; i>= 0;i--)  {  cout<<names[i]<<endl;  }

Other Questions
Spending a day observing a professional in his or her workenvironment is called:A. an internshipB. volunteering.C. community service.D. a job shadow. Who were the participants in the Chinese Civil War of 1927-1949? What was the outcome? Which voltage would cause a current of 0.5 ampere in a circuit that has a resistanceof 24 ohms? 1.)48V2.)6.0V3.)24V4.)12V please help!Write a story for this equation: $10 - $4.05 = c. Every rational number is an integer. True or false? PLEASE ANSWER ASAP!!! Irregular Yo Forms Fill in with the Yo form of the verbs given Decir (to say, to tell) 9. Saber (to know info)Hacer (to do, to make) 10. Conocer (to know a person)Conseguir (to get, to obtain) 11. Dar (to give)Seguir (to follow) 12. Ver (to see)Poner (to put, to place) 13. Salir (to leave)Suponer (to suppose) 14. Valer (to be worth)Traer (to bring) 15. Ir (to go)Caer (to fall) 16. Conducir (to drive) when banker expects a rise in interest rates in the fututre then the best strategy for the present is add -3.8 + 9.8 + 5.7 The Work in Process inventory account of a manufacturing company shows a balance of $2,400 at the end of an accounting period. The job cost sheets of the two uncompleted jobs show charges of $400 and $200 for direct materials, and charges of $300 and $500 for direct labor. From this information, it appears that the company is using a predetermined overhead rate, as a percentage of direct labor costs, of: _______a. 300% b. 80% c. 240% d. 125%. In which system of government would states function independently of each other?solitaryunitaryfederalconfederal Whats the slope of these points (-8,3) and (-8,2) The opportunity cost of attending college is likely to be highest for a high school graduate a. who is capable of playing a well-paid professional sport. b. who has access to student loans. c. whose family is extremely wealthy. d. who is very intelligent. Mary leaves her house to take a walk. The graph shows the distance, d, in feet from her house that Mary is at any given time, t, in minutes. How many minutes has Mary walked when she reaches the farthest point from her house? Shelley compared the number of oak trees to the number of maple trees as part of a study about hardwood trees in a woodlot. She counted 9 maple trees to every 5 oak trees. Later in the year there was a bug problem, and many trees died. New trees were planted to make sure there were the same number of trees as before the bug problem. The new ratio of the number of maple trees to the number of oak trees is 3:11. After planting new trees, there were 132 oak trees. How many more maple trees were in the woodlot before the bug problem than after the bug problem? A pair of shoes cost $120 but they are 25% Off;What would be discount and the final price of thoseshoes? The price of soft drinks increases. Which of the following is not part of the likely chain of events that follows from this price change? A. Producers of soft drinks increase their production of soft drinks. B. The manufacturers of sodacanning machines lay off some workers. C. Some consumers of soft drinks reduce their consumption of soft drinks. D. The demand for fruit juices increases. Find the EAR in each of the following cases: a. 19% compounded quarterly.b. 15% compounded monthly. c. 19% compounded daily. d. 16% with continuous compounding. In an experiment what are all the possible parts of an experiment or observation called? a. constant b. observations c. factors d. variables it is science How many bonding and antibonding molecular orbitals are there in methane, CH4? Bonding orbitals Antibonding orbitalsZero ZeroOne OneTwo TwoThree ThreeFour Four