1. The basis for formulating cost management plans include project management plans, project charters, business environment factors, and organizational process assets. 2. The basic elements of information security are: ●Confidentiality: Ensure that information is not exposed to u

1. The basis for formulating cost management plans include project management plans, project charter , career environment factors, and organizational process assets .

2. The basic elements of information security are:
●Confidentiality: Ensure that information is not exposed to unauthorized entities or processes.
● Integrity: Only those who are allowed can modify the data and can determine whether the data has been tampered with.
● Availability: Authorized entities can access data when needed, that is, the attacker cannot occupy all resources and hinders the authorized's work.
● Controllability: It can control the flow of information and behavior within the scope of authorization.
● Reviewability: Provides the basis and means for investigation of arising network security issues.

3,

4, the transaction information stored on the blockchain is public, but the account identity information is highly encrypted and can only be accessed under the authorization of the data owner, thus ensuring the security of the data and personal privacy.

5. The main contents of the project proposal include: business analysis, overall construction plan, this period of project construction plan, project implementation progress, etc.

6. The project construction unit may stipulate that the project proposal link is omitted for smaller system integration projects and merge it with the feasibility analysis stage.

7. Tools and technologies for controlling risks include: risk reassessment, risk audit, deviation and trend analysis, technical performance measurement, reserve analysis and conferences.

8. On-demand service: "Cloud" is a huge resource pool that can be billed based on the user's purchase volume like tap water, electricity, gas .
high scalability: The scale of "cloud" can be dynamically scalable to meet the needs of application and user scale growth.

9. The security level of the computer room is divided into three basic categories: Class A: There are strict requirements for the safety of the computer room and complete computer room safety measures; Class B: There are strict requirements for the safety of the computer room and relatively complete computer room safety measures. Category C: There are basic requirements for the safety of computer rooms and basic computer rooms.

10. Policies include government-made rules or systems for tax systems, credit management and fees, privacy issues, etc. E-commerce related laws include legislation or regulations on consumer rights protection , privacy protection, authenticity determination of e-commerce transactions, intellectual property protection and other aspects.