11. The _____________ make use of extensive past project
data.
12. The _____________ approach has led to overestimation or
underestimation, each of which translates into a negative impact on
the success of the project.
13. __________ vulnerabilities are generally a consequence of
people-based issues.
14. __________ vulnerabilities are a consequence of ill-defined
organizational rules.
15. __________ vulnerabilities usually result from inadequate
supervision, negligent persons, and natural disasters.
11. data intensive techniques - data-intensive computing is a class of parallel computing applications which use a data parallel approach to process large volumes of data typically terabytes
12.planning fallacy - The planning fallacy is a phenomenon in which predictions about how much time will be needed to complete a future task display an optimism bias and underestimate the time needed.
13. Behavioral and attitudinal
14. Misinterpretation
15. Physical - Physical Vulnerability is defined as any flaw or weakness in a data system or its hosting environment that can enable a physical attack on the system.
Get Answers For Free
Most questions answered within 1 hours.