Answers

Answer 1

Answer:

man·age·ment style

noun

plural noun: management styles

the methods used by a person in managing an organization or group of people.

"the players seemed to lose confidence in his management style"

Explanation:

lol is that good?

Answer 2

Answer:

A Management style is the particular way managers go about accomplishing these objectives.


Related Questions

What impact, if any, have advances in technology had on people’s ability to communicate through media? Advances in technology have had no measurable impact on people’s ability to communicate through media. Advances in technology have made it more difficult for people to communicate through media. Advances in technology have made it easier for people to communicate through media. Advances in technology have had made it both easier and more difficult to communicate through media.

Answers

Answer:

What impact, if any, have advances in technology had on people's ability to communicate through media? Advances in technology have made it easier for people to communicate through media.

Answer:

advances in technology made it easier for ppl to communicate through media

Explanation:

because i got it right

The router is physically located in a server room that requires an ID card for access. You backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with the username admin and the password admin. You used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device

Answers

Answer: Use an SSH client to access the router configuration.

Change the default administrative username and password

Explanation:

Based on the information given, in order to increase the security of the device, it's vital to use an SSH client to access the router configuration. The SSH client refers to the program that helps in establishing an authenticated and secure SSH connections to the SSH servers. It's vital for operating network services securely over a network that's unsecured.

Also, the default administrative username and password should be changed to a more secure username and password which can't be easily known by a third party.

(e) Give the output of the following:
String n="Computer Knowledge";
String m = "Computer Applications";
System.out.println(n.substring(0,8).concat(m.substring(9)));​

Answers

Answer:

Computer Applications

true

Answer:

Computer Applications

Explanation:

true

what is robotic technology

Answers

Answer:

according to britannica :

"Robotics, design, construction, and use of machines (robots) to perform tasks done traditionally by human beings. ... Robots are widely used in such industries as automobile manufacture to perform simple repetitive tasks, and in industries where work must be performed in environments hazardous to humans"

Explanation:

Express your opinion on whether a successful business analyst can be a good programmer. support your answers with reason

Answers

I think that a successful business analyst could be a good programmer because if they had the write training and experience they could learn about that field of work and become good at programming

What defines interactive media? The user must play a role in writing the content of the media. The user must do something that determines what happens next. The user must help design the overall look and feel of the presentation. The user must provide feedback after using the media.

Answers

Answer:

What Is Interactive Media?

Interactive media is a method of communication in which the program's outputs depend on the user's inputs, and the user's inputs, in turn, affect the program's outputs. Simply put, it refers to the different ways in which people process and share information, or how they communicate with one another. Interactive media allows people to connect with others—whether that's people or organizations—making them active participants in the media they consume

Answer:

The user must do something that determines what happens next.

It is B.

Data stored on physical storage devices must do what before the processor can access it? Be converted to binary Be written to the hard drive Go into short-term memory Go from volatile to nonvolatile memory

Answers

Answer:

Go into short-term memory

Explanation:

Data stored on physical storage devices must go into short-term memory before the processor can access it.

This is because, physical storage devices are secondary memory which store information for a long time. The CPU does not work directly with secondary memory but with primary or short term memory. Since the CPU works mainly with short term memory, information in physical storage or secondary memory has to go into short term memory for the CPU to be able to process it.

So, data stored on physical storage devices must go into short-term memory before the processor can access it.

What is the difference, if any, between a project manager and a producer on a digital media production team? A project manager oversees the entire project, while the producer just oversees the creative element. A project manager just oversees the creative element, while a producer oversees the entire project. A project manager is in charge of the people involved in the project, while the producer secures the funds. A project manager secures the funds for the project, while the producer is in charge of the people involved.

Answers

Answer:

A project manager just oversees the creative element, while a producer oversees the entire project.

It is B

Answer:

b

Explanation:

got it right on the quiz

what is a common translator?​

Answers

Answer:

Conventional interpretation is the process of converting (simultaneously or sequentially) a word/sentence/paragraph/text from one language to another in spoken form without changing the meaning, helping people who do not share the same language. one language can understand each other.

Explanation:

Answer:

A translator is a programming language processor that converts a computer program from one language to another . It takes a program written in source code and converts it into machine code. It discovers and identifies the error during translation.

Write a program to input the TotalCost and display the Assured gift as per the following criteria TotalCost(TC) Assured Gift Less than or up to 2000 Wall Clock 32001 to 5000 School Bag 5001 to 10,000 Electric Iron More than 10,000 Wrist Watch​

Answers

Answer:

The program in Python is as follows:

TotalCost = int(input("Total cost: "))

if TotalCost <= 2000:

   print("Wall Clock")

elif TotalCost >= 2001 and TotalCost <= 5000:

   print("School Bag")

elif TotalCost >= 5001 and TotalCost <= 10000:

   print("Electric Iron")

else:

   print("Wrist Watch")

Explanation:

This gets input for total cost

TotalCost = int(input("Total cost: "))

If the total cost is up to 2000, print wall clock as the assured gift

if TotalCost <= 2000:

   print("Wall Clock")

If the total cost is between 2001 and 5000 (inclusive), print school bag as the assured gift

elif TotalCost >= 2001 and TotalCost <= 5000:

   print("School Bag")

If the total cost is between 5001 and 10000 (inclusive), print electric iron as the assured gift

elif TotalCost >= 5001 and TotalCost <= 10000:

   print("Electric Iron")

If the total cost is more than 10000, print wrist watch as the assured gift

else:

   print("Wrist Watch")

the second generation computer used. as a memory device

Answers

Answer:

The period from 1959-1965 was the second generation. Transistors that are cheaper, consumed less power, were used in this generation, were more compact, were more reliable, and were faster than first-generation vacuum tubing machines.

Explanation:

The primary memories and the magnet tapes and magnetic discs were used as secondary storage equipment in this generation.

The montage language and high programming languages such as FORTRAN, COBOL, have been used in this generation. The computers used batch processing and operating system multi-programming.

A memory is like the brain of human beings. It is used for storing information and instructions. Computer memory is the storage space on the computer that processes data and saves instructions for processing.

The memory is split into many small parts known as cells. There is a unique address for each location or cell, which varies from 0 to memory minus one.

There are three basic types of memory:

Memory Cache

Main Memory/Primary Memory

The Memory of a Second Kind

In what way, if any, has community building changed in the age of digital media? People’s community building has not changed in the age of digital media. People are now more willing to share highly personal information with strangers. People are now far less interested in building community or connecting with others. People are now more interested in forming communities based on physical location.

Answers

Answer:

People are now more willing to share highly personal information with strangers. Match each type of digital health, wellness, and security with examples of potential violations.

Universal Containers uses a custom object within the product development team. Product development, executives, and System Administrators should be the only users with access to records of this object. Product development needs read/write access to all the records within the object, while the executives should only be able to view the records. How can the System Administrator configure the security model to meet these requirements

Answers

Answer:

The answer is below

Explanation:

Considering the scenario described in the question, the right answer is that, the System Administrator would configure the security model to meet these requirements by setting the Organization-Wide Defaults for the custom object to Private.

Then follow by giving the Product Development Modify All for the object; And finally, give the Executive Profile View All access.

write a program to print grade according to percentage which is entered by the user at run time.​

Answers

Explanation:

pseudo code

var A=90%

var B=80%

var C=70%

var F=60%

var input=input

if(input>=A){

console.log(" A")

}

if(input>=B){

console.log(" B")

}

if(input>=C){

console.log(" C")

}

if(input>=F){

console.log("F")

}

Using a combination of symmetric and asymmetric key encryption, Sofia sent a report to her home office in Indiana. She received an e-mail acknowledgement that her report had been received, but a few minutes later she received a second e-mail that contained a different hash total than the one associated with her report. This most likely explanation for this result is that

Answers

Group of answer choices.

A) the public key had been compromised.

B) the private key had been compromised.

C) the symmetric encryption key had been compromised.

D) the asymmetric encryption key had been compromised.

Answer:

C) the symmetric encryption key had been compromised.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Email encryption is the encryption and authentication of an email to protect the message therein from being read by any person other than the intended recipients. Thus, it protects the email from hacking or invasion by a third party.

Basically, when the message is signed with the sender's private key, the receiver can verify its authenticity using the sender's public key.

Also, encrypting the email message with the receiver's public key provides confidentiality.

In this scenario, the most likely explanation for this result is that the symmetric encryption key had been compromised.

Computers work on the garbage-in, garbage-out concept. Comment

Answers

Stands for "Garbage In, Garbage Out." GIGO is a computer science acronym that implies bad input will result in bad output.

Because computers operate using strict logic, invalid input may produce unrecognizable output, or "garbage." For example, if a program asks for an integer and you enter a string, you may get an unexpected result. Similarly, if you try to open a binary file in a text editor, it may display unreadable content.

GIGO is a universal computer science concept, but it only applies to programs that process invalid data. Good programming practice dictates that functions should check for valid input before processing it. A well-written program will avoid producing garbage by not accepting it in the first place. Requiring valid input also helps programs avoid errors that can cause crashes and other erratic behavior.

NOTE: Because the related terms FIFO and LIFO are pronounced with a long "i," GIGO is typically pronounced "guy-go" (not gih-go). This also helps avoid confusion with the prefix "giga," which is pronounced with a soft "i."

can someone answer this? I'll mark u the brialintest!

Answers

pre convert single digits, or sometimes parts of a sum, then sum up. like this:

1.) 2³+2²+2^1+2^0 = 8+4+0+1 = 13

2.) 512 + 0 + 128 + 0 + 0 + 16 + 0 + 4 + 2 + 0 = 1010010110

you just need to know what the powers of two are, then you know how to convert numbers.

like 100 = 4 and 1 = 1 then 101 = 4 + 1 and in the other direction just take chunks of 5 until theres nothing left, but care not to overshoot the sum

5 = 2² + 0 + 2^1 = 101 in base2

the zeros are for the order, every time I would overshoot, it's a zero.

3.) 16 + 2 + 19 = 37

4.) 8² is 64, or (100)base8

8³ or 1000 would already overshoot, so let's see what we can do with the smaller value of a digit in base8, 8² = 64

we can 8 different digits (0 to 7) in base8

7x8^2 + 2*8^1 + 5*8^0

448 + 16 + 5

= (725)base8

very low battery right now. let me now if this already helps to grasp the concept. I'll come back later.

edit1: recharging my phone now. but I need to show quickly in order to get my own stuff done.

quick side note on topic: the number always stays the same, like if there would be a number of beans lying on the table. we justcrrorder them to write in another system. in normal base 10, 312 beans would be grouped intuitively in 3*100, 1*10 and 1*1

or: 3*10^2 + 1*10^1 + 2*10^0

note that something to the power of zero is always one (e.g.: 5^0 is like 5÷5)

A security administrator logs onto a Windows server on her organization's network. Then she runs a vulnerability scan on that server. Which type of scan was conducted in this scenario

Answers

The credentialed scans were scans in which the scanning computer has had an account upon the computer being scanned. It enables the software scanner to run a much more thorough check looking for faults that can also be detected from the network.These are more successful since they have broader access to an organization's network.Its connection reduces the exposure of your critical credentials to potential attackers while enabling your security team to execute critical security evaluations.Therefore, the answer is "credentialed scan".  

Learn more:

credentialed scan: brainly.com/question/14728460

A host is on the 192.168.146.0 network that has a subnet mask of 255.255.255.0. The binary value of the host portion is 11010101. What is the decimal value of the host portion of the address?

Answers

Answer:

213

Explanation:

The given parameters are;

The network on which the host is on = 192.168.146.0

The subnet mast = 255.255.255.0

The binary value of the host portion = 11010101

To convert the binary value to decimal value, we proceed by multiplying each of the digits of the binary value by the corresponding power of 2, from the left to right, starting from a power of 0, and sum the result, as follows;

(11010101)₂ = (1×2⁷ + 1×2⁶ + 0×2⁵ + 1×2⁴ + 0×2³ + 1×2² + 0×2¹ + 1×2⁰)₁₀

1×2⁷+1×2⁶+0×2⁵+1×2⁴+0×2³+1×2²+0×2¹+1×2⁰= 128+64+0+16+4+1 = 213

∴ (11010101)₂ = (213)₁₀

The decimal value of 11010101 is 213.

Which category was originally developed to protect both digital and hard-copy sensitive information?

Answers

Answer:

Information assurance

Explanation:

Information assurance was originally developed to protect both digital and hard-copy sensitive information.

What type of operating system is Linux? An outsourced operating system An open source operating system A closed source operating system A variable source operating system

Answers

Answer:

Linux is a free, open source operating system.

Explanation:

Answer:

Linux is an open source operating system (OS). An operating system is the software that directly manages a system's hardware and resources, like CPU, memory, and storage.

Write a program that takes the account's present value, monthly interest rate, and the number of months that the money will be left in the account as three inputs from the user. The program should pass these values to a function thatreturns the future value of the account, after the specified number of months. The program should print the account's future value.

Answers

Answer:

Assuming this is going to de made with python:

def main():

   currentValue = float(input("Current value of account: "))

   monthlyInterestRate = float(input("Monthly interest rate: "))

   monthsToWait = int(input("Amount of months the money will be left in the account: "))

   monthlyInterestRateToPercent = monthlyInterestRate / 100

   futureValue = float(round((currentValue + currentValue * monthlyInterestRateToPercent * monthsToWait), 2))

   print("The future value of this account will be " + str(futureValue))

main()

Explanation:

Hope this helped. Also, if this is incorrect please tell me what needs to be added so I can add it for future viewers. Have a good day :)

A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in the OS), which sends tracking signals that enable location and recovery of a stolen device. The other component is a Persistence Module, which restores the Application Agent and allows it to survive reinstallation of an operating system or reformatting of the hard drive. The highest level of security offered by LoJack can be achieved when Persistence Module resides in the:

Answers

Answer: Computer's BIOS

Explanation:

Following the information given in the question, the highest level of security that is offered by LoJack can be achieved when Persistence Module resides in the computer's BIOS.

The BIOS (basic input/output system) refers to the program which the microprocessor of a computer uses in starting the computer system when the computer is powered on. It should also be noted that the BIOS is used in managing the data flow that exist between the operating system of the computer and the attached devices like the keyboard, hard disk, mouse, etc.

A computer is an.............. device.​

Answers

Explanation:

A computer is an electronic device

Answer:

Computers are electronic devices that process information.

Which formatting group would commonly be used for monetary figures?

number
general
accounting
currency

Answers

Answer:

currency.

Explanation:

A word processor can be defined as a software application or program designed to avail the end users the ability to type and format text documents for various purposes.

Some examples of word processors are Notepad, Microsoft Word, etc.

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

Formatting in Microsoft Word refers to the appearance of texts in a document.

Basically, to format a text typically involves performing tasks such as, bold, underline, italics, font-size, font-types, color, etc.

The commands to perform the above tasks are mainly found in the format menu of the Home tab.

In Microsoft Word, you can set the display format for date, percentage, number, and currency (monetary figures). Thus, this format styles define how these values are displayed in charts and tables.

In this context, the formatting group which is commonly used for monetary figures (numerical data) such as dollar, euro, yen, naira, etc., is called currency.

Answer:

I think the answer is D

Have a good day!

Bruce frequently works with a large number of files. He is noticing that the larger the files get, the longer it takes to access them. He suspects that the problem is related to the files being spread over the disk. What utility can be used to store the files contiguously on the disk

Answers

The utility that could be stored for the files is disk defragmenter.

The following information related to the disk defragmenter is:

In the case when the program saved the file on the disk so here the file should be put onto the empty space. It considered all the parts & pieces on each and every file and the same should be stored in one place.Also, the programs should be kept in one place, and the space that is not used should be on the hard disk.

Therefore we can conclude that The utility that could be stored for the files is disk defragmenter.

Learn more about the disk here: brainly.com/question/12656426

write the step by approach to re saving a document using the save as option

Answers

Press save as and then choose your location to save it and then click save

If you were creating your own website, what would you include to make sure your website was reliable and
valid?

Answers

Answer:

I would make sure to include all the sources i used? IT depends on what the website is about.

Explanation:

Hey there!

These are the best things to do to your website if you want to make sure it's reliable and valid:

Include research Do NOT include any biased opinions

Hope this helps!

Have a great day! :)

Ben is working in an IT services organization that uses the National Institute of Standards and Technology (NIST) functional impact categories to describe the impact of incidents. During a recent construction project, a contractor plugged a network device to the same switch twice, resulting in a network loop and taking down the organization's network for one-third of its users. Which functional impact category should Ben use to classify the event given in the scenario

Answers

Answer:

Medium

Explanation:

The functional impact category in NCCIC Cyber Incident scoring system considers incident impact to the organization. This category isn't severe and can result from such things as minor network breakdowns in the organization. It is given a priority score according to the scoring system of medium which is yellow in the priority level.

In 2004, a large department store chain in Germany was forced to withdraw customer loyalty cards when the press discovered that the company had secreted radio-frequency identification (RFID) tags in the plastic. Even when enclosed in a wallet or purse, these cards can transmit information over distances of about a meter, and the stores planned to use them to track which departments the customer visited. At issue was which data security issue

Answers

Answer:

the data security issue at issue was consumer privacy.

Explanation:

Consumer privacy refers to how sensitive personal information provided by customers is handled and protected throughout routine transactions.

Consumer privacy is ingrained in all of contact with consumers. Consumer privacy is crucial since it can have an impact on a company's brand, disrupt the customer experience, and potentially harm its reputation.

A company's failure to preserve consumer privacy can prohibit it from generating more income and gaining new customers.

Therefore, the data security issue at issue was consumer privacy.

Other Questions
Find the real or imaginary solutions by factoring. X^4 -3x^2 = -2x^2 CLS N = 1 FOR J = 1 TO 5 PRINT N N = 10*N+1 NEXT J END Which of the following linear functions has a graph which passes through points (5,2) and (3,0)? 1. 2. 3. 4. 5. I (meet) some friends while I (go) for a walk in the park near my house. Its easy . (contact) with him. You cant speak to my brother now. He (take).a bath. We are so excited because we (see). Dam Vinh Hung next week. We (live).here since I (be) 3 years old. You are the CEO of a home appliance manufacturing company and have recently undertaken a review of your company's strategy. In comparing your stock market valuation to that of your closest competitor, you note that your firm is currently valued at $50 billion, while your competitor is valued at $40 billion. How should you proceed?A.Consider this evidence of a sustainable competitive advantage and maintain your current strategy B. Compare the current valuations with past valuations to determine a trend C. Assume your current strategy has failed and begin to formulate a new one D. Compare your valuation to firms in another industry. A rectangle with an area of 3990 cm2 is x centimeters wide and (x+4) centimeters long. To the nearest tenth of a centimeter, the width and length are What are factorials? And how do you do them in fractions like 4!5!- How do you do that question? And why do you leave 6! The 5! without anything, like why does it not go like (5)(4)(3)(2)(1)? Why is it like that? Evaluate 1/243 ( base must be 1/9)PLEASE I NEED THIS FAST! Teacher contact information help can be needed please A solution of acetic acid and water contains 205.0 g L-1 of acetic acid and 820.0 g L-1 of water. Compute the density of the solution ( report your answer in g per mL) Water droplets are pulled towards earth by ______________. Conducting a search of the story is part of store closing duties why Express the prime number 19 as the difference of two squares? 19 = What effect does temperature have on reaction rate?A. An increase in temperature does not change the reaction rate,B. An increase in temperature keeps the reaction from stopping.C. An increase in temperature speeds up the reaction rate.D. An increase in temperature slows the reaction down. 1) (30 pts ) Oxygen (O2) flows through a pipe, entering at at 4 m/sec at 10000 kPa, 227oC. For a pipe inside diameter of 3.0 cm, find the volumetric flow rate (m3/sec) and the mass flow rate of the gas (kg/sec) assuming you have an ideal gas What is the period of the graph of y = 5 sin (pi x) + 3? Mrs. Tuff is now insistent that Tommy sits in her lap and as she speaks to Tommy he begins to cry more and refuses to open his mouth. Mrs. Tuff continues to tell Tommy that it won't hurt and if he only opens his mouth, he will get a toy. What steps can you take now to get Tommy to cooperate? Alex purchased 1/2 of a gallon of milk. He put 2/11 of the milk in a smoothie. How much of a gallon of milk did Alex put in his smoothie? List the following substances in order of decreasing boiling point:CO2, Ne, CH3OH, KF