Computer Science/Information Technology

In your own words, explain why each of the following is considered bad practice:
Shared accounts, Unique user accounts with no password required, Unique user accounts with no changing of password, and Administrators having used their privileged accounts to perform basic user activities.

Next,
Name and Describe two (2) United States based compliance laws that exist.

Discuss the levels of the CMMI process improvement approach.

Explain what a Scope is and why it is important to a Risk Management Project?

What is the Cost Benefit Analysis and why is it important?

Name and describe the three types of Project management charts.