Jim decides to purchase a business insurance policy to protect himself against liability from hacker attack. What risk management technique is Jim practicing?
a. Risk mitigation
b. Risk avoidance
c. Risk transference
d. Risk acceptance
Answer: c. Risk transference
You might also like to view...
________ printers create an image by heating specially coated heat-sensitive paper that changes color where the heat is applied
A) Inkjet B) Thermal C) Laser D) Dye-sublimation
Dynamic binding determines which function should be called at runtime, based on the ____ type making the call.
a. object b. class c. function d. operator
When an application is run, the method that must be executed first must be named ____.
A. first() B. void() C. main() D. final()
Consider the statement: int anInt = Integer.parseInt("649"); You can tell that parseInt() is a(n) ____ method because you use it with the class name and not with an object.
A. programmer-defined B. instance C. static D. immutable