The keys to successful outsourcing are accountability, reporting, and _____

Answers

Answer 1

Answer:

planning

Explanation:


Related Questions

Predict the future that social media will have on society or the environment.

Answers

Answer:

Social networks are becoming more and more popular. More than 80% of the 4.66 billion people on the planet with access to the internet are social network users… and this share is expected to grow!

Society will drift to technology and rely on it more.

Environment wouldn't be taken cared of, and may be damaged.

Explanation:

Answer:

The Influence of Social media is being used in ways that shape politics, business, world culture, education, careers, innovation, and more.

Explanation:

The Influence of Social media is being used in ways that shape politics, business, world culture, education, careers, innovation, and more.

why auto-updates can reduce the risk of a cyberattack?

Answers

Answer:

They help keep your software up to date.

Explanation:

Using Windows for example: With automatic updates, you don't have to search for updates online or worry about missing critical fixes or device drivers for your PC.

You can read more about it here: https://support.microsoft.com/en-us/windows/windows-update-faq-8a903416-6f45-0718-f5c7-375e92dddeb2

I hope this helps you!

1 2

3 4

Question #4

Multiple Choice

Which statement is true about the random and secrets modules?

O Only the secrets module can generate random numbers.

O Both modules can generate random numbers.

Neither module can generate random numbers.

O Only the random module can generate random numbers.

Answers

Answer:

Both modules can generate random numbers.

Explanation:

Both the random and secrete modules are builtin programming modules used for generating random number variables. The random module consists of a number of methods in its module for random. number generation such as seed() ; getstate() ; random() ; choice() ; randrange() ; randint() and so on. Random methids are best for generating random numbers which are to be adopted for simulation or modeling. The secrete modules does the same however, numbers generated are stronger and less predictable than the random number modules. Secrete modules are usually adopted in the generation of authentication token and security pins.

Answer:

Neither module can generate random numbers.

Explanation:

Because I took the quiz and that's the right answer.

What is meant by an "intractable (impossible)" problem? *

Answers

From a computational complexity stance, intractable problems are problems for which there exist no efficient algorithms to solve them. Most intractable problems have an algorithm – the same algorithm – that provides a solution, and that algorithm is the brute-force search

Need answer quick plz.

Fill in the blank with the correct response.

A colleague excitedly tells you she has created a interface component for SPSS, a statistics software program. She

has created a

Answers

Answer:

SPSS

IS THE ANSWER

IHOPEIT WILL HELP YOU

Answer:

wassup with it bro i don't even know the answer and i just want the points

Explanation:

two ways in which some culter views that exist may affect a relationship negatively​

Answers

Answer:

some people say different culture less they get along

Explanation: or more

How do you open an application on the macOS?

Answers

Click the Launchpad icon in the Dock, or pinch closed with your thumb and three fingers on your trackpad. Then click an app to open it. You can also type an app's name to find the app in Launchpad, then press the Return key to open it.

Answer:

you can simply click on 'application' in the sidebar to open your default application folder, which contain for each app on your system.you can double click any of the icons in here to open them or take you to do it if currently open.

A citation and its ____________________ can be entered at the same time. [Insert Citations]
Question 4 options:

name

date

source

table of contents

Answers

Answer: source

Explanation:

A citation and its source can be entered at the same time. Hence option c is correct.

What is citation?

Citation is defined as how you disclose to your readers that a particular passage in your work was taken from another source. Identifying the sources you used to obtain your knowledge can demonstrate to the reader that you did thorough investigation. to recognize and respect other scholars' work by giving them due credit.

Select the phrase or sentence you wish to cite by clicking at the end of it, and then select Insert Citations from the Citations & Bibliography group on the References tab. Choose the citation you want to use from the list provided under "Insert Citation."

Thus, a citation and its source can be entered at the same time. Hence option c is correct.

To learn more about citation, refer to the link below:

https://brainly.com/question/1272936

#SPJ2

what is two features of the minicomputer?​

Answers

Answer:

It is smaller in size than a mainframe computer. It is less expensive than a super and mainframe computer. It is not much more powerful than the mainframe and supercomputer, but powerful than microcomputers. It supports multiprocessing and multi-tasking.

Explanation:

What is the purpose of "theme_color" in Word Press?


to change the color of the frame

to change the color of any buttons

to change the color of the text

to change the color of the background

Answers

the answer is 3. to change the color of the text

Answer:

Change the color of the text

How do computers process data?

Answers

Data processing, Manipulation of data by a computer. It includes the conversion of raw data to machine-readable form, flow of data through the CPU and memory to output devices, and formatting or transformation of output. Any use of computers to perform defined operations on data can be included under data processing.

Hope this helps!

What is the solution to the equation ?

Answers

There’s no solution to the equation
The correct answer is option D. No solution

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID for access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with a user name of admin and a password of admin. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device

Answers

Answer:

The answer is "Use SCP to back up the router configuration to a remote location".

Explanation:

In the SPC, it is the Secure Copy Protocol that allows information to be stored and securely transmitted. Its SCP doesn't encrypt its digital information by itself; it corresponds to both the Security module which provides authentication or security. It allows the safe transfer of personal documents from either a host machine to a remote server. Its transference protocol "FTP" is quite close, but it adds security and authentication.

I'm in need of an answer im not just wasting points for your benefit anymore..

Chris has handed over the screenplay to the sound designer to design the sounds in the movie. He told the sound designer that he has deany Indicated each sound in every scene. How do you think Chris indicated the sound effects in the screenplay?
OA by making the word indicating sound boldface
OB by capitalizing the word indicating sound
OC. by highlighting the word indicating sound
OD. by underlining the word indicating sound​

Answers

Answer:

i would say A, to me it just makes sense

Explanation:

Answer:

B) by capitalizing the word indicating sound

Explanation:

In most scripts for screenplays, words indicating a certain sound for a scene is usually in uppercase letters.

- 2022 Edmentum

QUESTION 4 of 10: What term refers to the basic characteristics of a population segment, such as gender, age, and income?

Answers

272727727272727226282829292
Does it offer multiple choices?

Describe white blood cells you see at 10X?

Answers

Answer:

White blood cells are part of the body's immune system. They help the body fight infection and other diseases. Types of white blood cells are granulocytes (neutrophils, eosinophils, and basophils), monocytes, and lymphocytes (T cells and B cells). ... Also called leukocyte and WBC.

Explanation:

Write a while loop that produces the following output:
1
2
4
8


please i need help

Answers

Answer:

Explanation is being shown in the file to the link

Why did the editors choose to rearrange the intercutting between Luke’s story and the Imperials? What effect did this have on the final film?

Answers

Answer:

Though it has its merit, know that the rule is not mandatory. ... A jump cut is a cut in film editing in which two sequential shots of the ... An intercut is a type of edit where two or more actions in distinct ...

The ________________________ option allows one to start a numbered list on any number desired. [Set Starting Number Values]
Question 7 options:

Number Formats

Change List Level

Define New Number Format

Set Numbering Value

Answers

Answer:

Set Numbering Value.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.

In Microsoft Word 2019, the users are availed with the ability to edit the word document in the following view type;

I. View Mode.

II. Print Mode.

III. Drift Layout.

A numbered list can be defined as a list of items that are ordered numerically or sorted sequentially.

Basically, it is best suited for steps or procedures that are to be done sequentially or in order i.e in an ascending order. Thus, a numbered list is an ordered list that starts from 1.

The Set Numbering Value option allows one to start a numbered list on any number desired. To automatically create a numbered list in Microsoft Word, you should press 1 followed by a period, leave a space, type a text and then press the enter button.

When inserting a new row you must first select the row that is Question 1 options: Above where you want the new row to be Below where you want the new row to be

Answers

Answer:

You can add columns, rows, or cells to an Excel worksheet or delete them. Columns insert to the left, rows above, and cells above or to the left. ... that formatting will be transferred to a new row or column that you insert. If you don't want the formatting to be applied, you can select the Insert Options button after you insert, and .

Explanation:

Answer:

Above where you want the new row to be

Explanation:

i took the test.

how and why Steve Jobs left Apple Computer.

Answers

Answer:

Jobs was forced out of Apple in 1985 after a long power struggle with the company's board and its then-CEO John Sculley. ... He was largely responsible for helping revive Apple, which had been on the verge of bankruptcy.

Explanation:

What is considered appropriate dress for men and women in the workplace? Select all that apply.

Answers

Answer:

I guess clean, pressured pants or skirt

and

dress shirts and ties

Answer:

the first and last

Explanation:

because you don't want to reveal any things that are inappropriate but you still want to be comfortarible.

a conditional statement begins with the word 'when" true or false

Answers

Answer:

False

Explanation:

Conditional statements always begin with 'if'.

How can you tell that someone is listening to what you through your device ?

Answers

Answer:here are some signs to look out for: Background noise. As with mobile devices, background noise whilst on a call is a sign that somebody else could be listening. Listen out for static, buzzing or clicks on the line.

Explanation:

Display the IP address of the default gateway of this device.

Answers

Answer:

ipconfig

Explanation:

Type ipconfig and look for a Default Gateway entry that is not blank.

Question # 1
Dropdown
Choose the word that matches each definition.
[ ] is the study of designing and building computers and computer-based systems.

Answers

Answer:

Computer engineering

Explanation:

Computer engineering is the answer

Which of the following algorithmic efficiencies would be considered LEAST efficient?

A. Linear
B. Constant
C. Polynomial
D. Exponential

Answers

Answer:exponential

Explanation: I believe

write Python statement to do the following tasks (a) create a list that contain the name of 5 student of your class (b) add one more name to the list of 5 students (c)
delete the first name from the list of student​

Answers

Answer:

classroster = ["Bill", "Tyler", "Jake", "Sam", "Joe"]

print("Original Roster: " + str(classroster))

classroster.append("June")

print("Added student: " + str(classroster))

classroster.pop(0)

print("Removed the first student" + str(classroster))

Explanation:

We create a variable named classroster and assign it a list value by using []

We print text with the value of the variable classroster, but we used the str tag to make it a string value

We used classroster.append to add "June" to the end of the list.

We then print the classroster again

We use classroster.pop(0) to remove "Bill" on the list. If we wanted to remove "Tyler" from the list, we would use classroster.pop(1).

If we wanted to remove "Jake" we would use classroster.pop(2)

and so on. goodluck!

Other Questions
A quienes se dirige la locutora Who began the Pops tradition, and why? Segment AB and segment CD intersect at point E. Segment AC and segment DB are parallel. If mA=41mA=41o and mD=56mD=56o, find the mAECmAEC. In which states is the Anadarko Basin located? Select all that apply. Texas Arkansas Oklahoma Colorado Louisiana Kansas 6. What is the center and the radius ( x + 1)^2 + (y - 5)^2 = 2^2Center (-1,-5) radius= 2Center (1,-5) radius= 2Center (-1, 5) radius= 4Center (-1, 5) radius= 2 Which problem is Nancy Reagan hoping to solve with this campaign?A Drug and alcohol abuse among childrenB The effects of video-game violence on childrenDiets high in sugar and salt among childrenDThe effects of explicit lyrics in music on children Somone pls help plssss I don't know How do I solve 5x/6=-8 to get the answer Identify the structure in the picture labeled as D in the picture above. (Level 1) Select the polynomials that are a difference of squares. Thank you so much for helping me!y^4225m^2n^41p^8q^416x^224 explain ways in which genetic variation and environmental factors contribute to evolution by natural selection and diversity Highest common factor of 15 30 and 45 define law and order ambientacin del cuento de un rbol terminantemente prohibidolo necesito rapido () what are phrasal verbs. please help will give brainliest A rectangular prism has a length of 1 1/4 centimeters, a width of 4 centimeters, and a heigh of 3 1/4 centimeters What is the volume of the prism? Enter your answer in the box as a simplified mixed number or a decimal HELP ME PLS WILL MARK BRAINLISTT!!!! PLEASE HELPIf 45 girls participated in basketball, then how many studentsare in the girls athletics program? On March 10, 2017, Steele Company sold to Barr Hardware 200 tool sets at a price of $50 each (cost $30 per set) with terms of n/60, f.o.b. shipping point. Steele allows Barr to return any unused tool sets within 60 days of purchase. Steele estimates that (1) 10 sets will be returned, (2) the cost of recovering the products will be immaterial, and (3) the returned tools sets can be resold at a profit. On March 25, 2017, Barr returned 6 tool sets and received a credit to its account.Prepare journal entries for Steele to record (1) the sale on March 10, 2017, (2) the return on March 25, 2017, and (3) any adjusting entries required on March 31, 2017 (when Steele prepares financial statements). Steele believes the original estimate of returns is correct. (Credit account titles are automatically indented when the amount is entered. Do not indent manually. If no entry is required, select "No entry" for the account titles and enter 0 for the amounts.) need this asap please