what allows customers to use the web to find answers to their questions or solutions to their problems?

Answers

Answer 1
Web based self service systems

Related Questions

FILL IN THE BLANK. _____ refers to computing devices everywhere with different sizes and power and accessed through multiple formats such as voice, touch, and gesture.

Answers

Answer: Ubiquitous computing

Explanation:

which two of the following statements describe key benefits of an integrated computer-assisted design (cad) module within an erp system?

Answers

The statement that  describe key benefits of an integrated computer-assisted design (cad) module within an erp system  are options A and B:

Managers can track processes that use computer-assisted design throughout an entire manufacturing cycle.

Managers can monitor the use of materials, machines and labor, and level of completion within CAD processes.

What are computer-aided design?

Computer-based software is seen as  used to facilitate design processes in CAD (computer-aided design). Different categories of engineers and designers frequently use CAD software. Drawings or three-dimensional (3-D) models can be made using CAD software in either two or three dimensions.

Note that Some of the uses for AutoCAD are listed below:

sketches related to architecture in general.planning for the interior of the space.Organizational charts and work flow diagrams.presentations, as well as proposals.every kind of graph.

Therefore, the featured ERP Benefits to a manager are:

More effective management.A greater degree of information availability and accuracy.coordination is better.Planning with precision.reports that are improved.Adaptability and scalabilityEfficacy in terms of costs.more convenient access to management systems

Learn more about integrated computer-assisted design from

https://brainly.com/question/14350050
#SPJ1

marco is in a web development program. he is studying various web-related standards that apply to cascading style sheets (css) and hypertext markup language (html). what authoritative source should he consult?

Answers

It is to be noted that where Marco is in a web development program and he is studying various web-related standards that apply to Cascading Style Sheets (CSS) and Hypertext Markup Language (HTML). The authoritative source that he should consult is: "World Wide Web Consortium (W3C)"

What is World Wide Web Consortium (W3C)?

The World Wide Web Consortium is the World Wide Web's primary worldwide standards body. The consortium, founded in 1994 and chaired by Tim Berners-Lee, is made up of member organizations with full-time personnel dedicated to the creation of World Wide Web standards.

The World Wide Web Consortium (W3C) is very much an international body comprised of member organizations, a full-time staff, and the general public that collaborates to produce Web standards. W3C's aim is to guide the Web to its full potential, led by Web inventor and Director Tim Berners-Lee and CEO Jeffrey Jaffe.

W3C standards establish an Open Web Platform for application development, which has the unparalleled potential to enable developers to create rich interactive experiences that are driven by massive data stores and accessible on any device.

Learn more about Cascading Style Sheets:
https://brainly.com/question/15174112
#SPJ1

what would you recommend, given the scenario below? situation: you are a programmer, and you need to create an array in java using the most efficient method. which of the following possibilities of declaring an array is best? a. while loop syntax b. do while loop syntax c. int[] trainarray

Answers

Option a is correct. While loop syntax is the possibilities of declaring an array is best.

A feature called a loop enables the execution of a sequence of instructions periodically up until a predetermined condition is false. The for loop, while loop, and do-while loop are the three forms of loops offered by Java. In Java, loops are also referred to as looping constructs or iterating statements.

Java statements known as "looping constructs" enable a set of instructions to be carried out repeatedly so long as a specific condition holds true.

The for loop, while loop, and do-while loop are the three forms of loops available in Java. While do-while loop is an exit-controlled loop, for and while loops are entry-controlled loops.

The daily routine of programmers, which includes eating, sleeping, and then programming, is a very clear example of a loop.

To know more about Java click here:

https://brainly.com/question/12978370

#SPJ4

How can workbook protection that has been applied to a workbook be removed? open the file, enter the password, and then resave the workbook to remove the protection. right-click the workbook and select remove protection from the menu list. select the cells to unprotect, click the home tab on the ribbon, and select lock cells in the format menu. click the review tab on the ribbon and click protect workbook in the changes group.

Answers

We can remove workbook protection that has been applied to a workbook by this step -  Click the review tab on the ribbon and click protect workbook in the changes group.

What is a Workbook in Excel?

A workbook in Microsoft Excel is a single file that contains one or more spreadsheets, also known as worksheets. Here's an example of a spreadsheet called "Sheet1" in an Excel workbook file called "Book1." Our example also includes the "Sheet2" and "Sheet3" sheet tabs, which are part of the same workbook.

When you launch Microsoft Excel (a spreadsheet application), you are launching a workbook. A workbook can contain one or more worksheets, which can be accessed via the tabs at the bottom of the current worksheet.

To know more about Workbook in Excel, visit: https://brainly.com/question/16845506?referrer=searchResults

#SPJ4

Which type of query is best suited for an outer join using two tables named “Products Offered” and “Cost of Products”?

a. one that should show all products offered by a company
b. one that should show only products that cost over $20
c. one that should show all duplicate products sold in a month
d. one that should show only prices of $20 that have products attached

Answers

The type of query is that best suited for an outer join using two tables named “Products Offered” and “Cost of Products” is: "one that should show only prices of $20 that have products attached" (Option D)

What is a Query?

A query is a request for information or data from a database table or databases. This data may be created as Structured Query Language (SQL) outputs or as pictorials, graphs, or complicated outcomes, such as trend analysis using data-mining tools.

There are five types of SQL queries: 1) Data Definition Language (DDL) 2) Language for Data Manipulation (DML) 3) Data Command Language (DCL) 4) TCL (Transaction Control Language) and 5) DQL (Data Query Language) (DQL) Data Definition Language (DDL) allows you to specify the structure or schema of a database.

The SQL Choose statement query in a relational database, which holds records or rows of information, allows users to select data and return it from the database to an application. The resultant query is saved in a result table, often known as a result-set.

Learn more about Query:
https://brainly.com/question/29575174
#SPJ1

describe benefits of cloud-based erp systems over on-premises erp solutions. more than one answer may be correct.

Answers

The benefits of using a cloud-based ERP are :

Economicaltime-savingincrease in productivitygrowth

What is cloud-based ERP?

Enterprise resource planning (ERP) on the cloud is a service provided by cloud providers to businesses on a subscription basis. Your ERP software's functionality can be accessed via remote cloud servers from any internet-connected device.

ERP is most effective when it can be accessible via the cloud, where business people may collaborate on papers and enter data from any location.

By removing the need for laborious on-site maintenance, the cloud's distance also makes it easier to operate ERP systems.

Cloud ERP solutions also save businesses money because they don't need pricey hardware to access and use cloud-based systems run by vendors.

The complete question is : describe the cost benefits of using a cloud-based erp compared to an on-premise system. more than one answer may be correct.

To learn more about ERP refer to :

https://brainly.com/question/26598341

#SPJ1

save your completed program happy4.py as happy5.py next add code to the function read gdp data() so that it looks up the happiness index for each country in the dictionary. the dictionary is passed to the parameter variable happy dict. looking up the happiness index in the dictionary is done same way as in part 3. if the country does not exist in the dictionary, no output should be printed for that country. finally, add a fourth column to your comma separated output that includes that happiness index. the first five lines of your updated programs output should look like this:
Country, Population in Millions, GDP per Capita, Happiness China, 1394.02, 18192.04,5.131433964 United States, 332.64,58592.03,6.882684708 India, 1326.09,7144.29,3.818068743 Japan, 125.51,43367.94,5.793575287 When you are satisfied your program works, save and submit this program to Gradescope as happy5.py.

Answers

Below is the coding solution in Python of the given problem in which we have to save the completed program happy4.py as happy5.py next and then add code to the given function that reads gdp data(), so that it looks up the happiness index for each country in the dictionary.

Coding Part:

import csv

def main():

happy_dict = make_happy_dict()

# print_sorted_dictionary(happy_dict)

read_gdp_data(happy_dict)

def make_happy_dict():

filename = "happiness.csv"

happy_dict={} # empty dictionary

# open the following file to read

with open(filename, 'r') as infile:

# read the contents of the given file into the list

csv_happy = csv.reader(infile)

# ignores first line of the said file

infile.readline()

# using for loop to read each of the line of the file

for line in csv_happy:

happy_dict[line[0]] = line[2]

return happy_dict

def read_gdp_data(happy_dict):

# string valid characters0

valid_characters = '0123456789.'

# name of the file

filename = 'world_pop_gdp.tsv'

# open the following file to read

with open(filename) as infile:

contents = infile.readlines()

headers = contents[0].strip().split('\t')

print('%-s,%-s,%-s,%-s'%(headers[0],headers[1],headers[2],"Happiness"))#print the happiness factor

for i in range(1,len(contents)):

data = contents[i].split('\t') # split using tab(\t) as the delimiter

country = data[0].strip()

population = data[1].strip()

gdp = data[2].strip()

mod_pop = ''

for ch in population:

if ch in valid_characters:

mod_pop= mod_pop + ch

mod_gdp = ''

for ch in gdp:

if ch in valid_characters:

mod_gdp = mod_gdp + ch

if country in happy_dict:

print('%-s,%-s,%-s,%-s'%(country,mod_pop,mod_gdp,str(happy_dict[country])))#print the happiness value if the country exists

return happy_dict

def print_sorted_dictionary(D):

if type(D) != type({}):

print("Dictionary not found")

return

print("Contents of dictionary sorted by key.")

print("Key", "Value")

for key in sorted(D.keys()):

print(key, D[key])

# call the main function

main()

To learn more about Python-Programming, visit: https://brainly.com/question/26497128

#SPJ4

if two methods in the same class have the same name but different signatures, the second overrides the first. t/f

Answers

If two methods in the same class have the same name but different signatures, the second overrides the first. [FALSE]

Understanding Polymorphism

Object-oriented programming or OOP has several important pillars. You must understand this. Among them are class, object, method, and inheritance.

Polymorphism is divided into two syllables namely, Poly which means many and Morphism which means form. In science, polymorphism is a principle in biology in which organisms or species have many forms and stages. This principle is also applied to the Java language.

Polymorphism in OOP is an OOP concept where class has many "forms" of different methods, even though the names are the same. The meaning of "form" is that the contents are different, but the data types and parameters are different.

Polymorphism can also be interpreted as a programming technique that directs you to program in general rather than specifically. For example, we have three different classes: “Rabbit”, “Cat”, and “Cow”. Where the three class are derived from class "Animal".

Learn more about polymorphism at https://brainly.com/question/29241000.

#SPJ4

You've just started a new job as a data analyst. You're working for a midsized pharmacy chain with 38 stores in the American Southwest. Your supervisor shares a new data analysis project with you.
She explains that the pharmacy is considering discontinuing a bubble bath product called Splashtastic. Your supervisor wants you to analyze sales data and determine what percentage of each store's total daily sales come from that product. Then, you'll present your findings to leadership.
You know that it's important to follow each step of the data analysis process: ask, prepare, process, analyze, share, and act. So, you begin by defining the problem and making sure you fully understand stakeholder expectations.
One of the questions you ask is where to find the dataset you'll be working with. Your supervisor explains that the company database has all the information you need.
Next, you continue to the prepare step. You access the database and write a query to retrieve data about Splashtastic. You notice that there are only 38 rows of data, representing the company's 38 stores. In addition, your dataset contains five columns: Store Number, Average Daily Customers, Average Daily Splashtastic Sales (Units), Average Daily Splashtastic Sales (Dollars), and Average Total Daily Sales (All Products).
You know that spreadsheets work well for processing and analyzing a small dataset, like the one you're using. To get the data from the database into a spreadsheet, what should you do?
Download the data as a .CSV file, then import it into a spreadsheet.

Answers

Using the knowledge in computational language in python it is possible to write a code that dataset contains five columns: Store Number, Average Daily Customers, Average Daily Splashtastic Sales (Units), Average Daily Splashtastic Sales (Dollars), and Average Total Daily Sales (All Products).

Writting the code:

def run_command(cmd):

   fields = map(unescape, cmd.split(";"))

   handlers[fields[0]](fields[1:])

...

handler("mail")

def mail_handler(address, template):

   import whatever

   ...

   send_mail(address, get_template(template) % user_info, ...)

def myMailCommand(...):

   ...

def myOtherCommand(...):

   ...

available_commands = {'mail': myMailCommand,

                     'other': myOtherCommand}

to_execute = [('mail', (arg1, arg2, arg3)),

             ('other', (arg1, arg2))]

for cmd, args in to_execute:

   available_commands[cmd](*args)

See more about python at brainly.com/question/18502436

#SPJ1

a loosely coupled or distributed multiprocessor consists of a collection of relatively autonomous systems, with each processor having its own main memory and i/o channels.

Answers

Through the use of simulation tools, the impacts of task routing and resequencing on a multiprocessor system's system and program performance are investigated.

Considered is a closed queueing network model. The CPU and the I/O channel make up this component. Four uniform and independent processors make up the CPU, each of which serves a separate queue. After CPU service, rescheduling of jobs makes sure that they leave the CPU in the order they were received. With subsequent job resequencing, we evaluate the performance of four task routing strategies for various processor service time coefficients (exponential and branching Erlang distributions) and levels of multiprogramming.

Learn more about system here-

https://brainly.com/question/14253652

#SPJ4

your network contains an active directory domain. the domain contains 2,000 computers that run windows 10. you implement hybrid microsoft azure active directory (azure ad) and microsoft intune. you need to automatically register all the existing computers to azure ad and enroll the computers in intune. the solution must minimize administrative effort. what should you use

Answers

Deploying Windows Autopilot profile. Using deployment profiles for Autopilot, the devices are set up. Up to 350 profiles may be made for each tenant.

What is a directory domain?Within a Microsoft Active Directory network, an Active Directory domain is a group of objects. An object can be a single person, a team, or a piece of hardware, like a computer or printer. Each domain has a database that stores data on object identities. In a hierarchical structure called a directory, information about network objects is kept. A directory service, like Active Directory Domain Services, gives network users and administrators the means of storing and making directory data accessible.A domain is a grouping of connected users, devices, and other AD objects, including all the AD objects belonging to your business.

To learn more about directory domain refer :

https://brainly.com/question/24215126

#SPJ4

A robot is designed to deliver snacks to patients in the hospital, allowing nurses to spend more time on skilled care. The robot needs to be able to navigate the hallways, avoiding patients who may be walking or using wheelchairs. What element of sensors addresses this concern?

security


communication


mobility


power source

Answers

Answer:

mobility

Explanation:

since it needs to move around people and navigate the hallways

The answer would be


MOBILITY

you welcome

an engineer utilizes digital forensics for information gathering. while doing so, the first focus is counterintelligence. which concepts does the engineer pursue? (select all that apply.)

Answers

The concept that the engineer pursue are:

1. Identification and analysis of specific adversary tactics.

2. Configure and audit active logging systems.

What is digital forensics?

Digital forensics is a field of forensic science that deals with the recovery, investigation, examination, and analysis of data found in digital devices, most commonly in connection with mobile devices and computer crime.

According to the Bureau of Labor Statistics, there will be a high demand for forensic scientists and information security analysts.

Therefore, the correct options are 1. Identification and analysis of specific adversary tactics, and 2. Configure and audit active logging systems.

To learn more about digital forensics, refer to the link:

https://brainly.com/question/3501191

#SPJ1

The question is incomplete. Your most probably complete question is given below:

1. Identification and analysis of specific adversary tactics

2. Configure and audit active logging systems

3. The tools are not preinstalled or running

4. The engineer focuses on behavioral threat research.

write a generic function that finds the largest among the three values. your function should have three parameters of the same type. test the function with int, double, and string values.

Answers

Functions that have one or more generic type parameters are referred to as generic functions.

How to write a generic function finds largest among the three values ?

Functions that have one or more generic type parameters are referred to as generic functions. They could be standalone functions or methods in a class or struct. A single generic declaration essentially declares a family of functions, with the sole difference being the actual type parameter's substitution with a different one.

#include <iostream>

using namespace std;

int main() {

      double n1, n2, n3;

cout << "Enter three numbers: ";

   cin >> n1 >> n2 >> n3;

    check if n1 is the largest number

   if(n1 >= n2 && n1 >= n3)

       cout << "Largest number: " << n1;

   check if n2 is the largest number

   else if(n2 >= n1 && n2 >= n3)

       cout << "Largest number: " << n2;

   

    if neither n1 nor n2 are the largest, n3 is the largest

   else

       cout << "Largest number: " << n3;

   return 0;

}

Output

Enter three numbers: 2.3 ,8.3 ,-4.2

Largest number: 8.3

To learn more about generic function refer to :

https://brainly.com/question/24304189

#SPJ1

you run the comman hostname server1 and issue the reboot command you notice that the host name has reverted back to what it was before the reboot

Answers

Using hostnamectl, set-hostname server1. To set the system's hostname and get the DNS name, use the hostname command in Linux.

What is command ?A command is a request sent to a computer program to do a certain task in computing. It may be transmitted through a command-line interface, such as a shell, as input to a network service as part of a network protocol, as an event in a graphical user interface triggered by the user picking an item from a menu, or by any of the following methods: The command is one of the Linux operating system's features. All simple and difficult tasks can be completed by running commands. To execute the commands, utilize the Linux terminal. The terminal is a command-line interface for interacting with the system, much like the Windows OS's command prompt.

To learn more about command refer :

https://brainly.com/question/25480553

#SPJ4

Select the correct answer.
If you're using consistently sized elements and regular spaces in an image, which rule of composition are you applying?

Answers

If you are using consistently sized elements and regular spaces in an image, the rule of composition that you are applying is option C. Rhythm.

How does rhythm work in composition?

A composition's rate of flow can be influenced by rhythm, which is patterned movement. Just as your ear will follow along with the rhythm of a song, your eye will follow rhythm made visually. Rhythmic patterns are built using elements and the intervals between them.

Therefore  one can say that the act of Repeating or echoing features are a hallmark of rhythm photography. It might consist of a pattern made of a number of forms that repeat. Or you may have many subjects that show up at various locations across the frame.

Learn more about Rhythm from

https://brainly.com/question/12550187
#SPJ1

See full question below

If you’re using consistently sized elements and regular spaces in an image, which rule of composition are you applying?

A. Contrast

B. rule of thirds

C. Rhythm

D.Hierarchy

zhen troubleshoots and repairs computers and networks for individuals and small businesses. which statement best describes what zhen offers to customers? a) a product only b) a service only c) both a product and a service d) neither a product nor a service

Answers

The statement that best describes the troubleshoots and repairs of computers and networks for individuals and small businesses is a service only

This is mainly because Zhen he's doing something and not giving them something. Every now and then a computer cannot connect to the network or communicate with other computers on the network. You will need to go through some basic network troubleshooting strategies to resolve this. It is conceivable that the network is down for a range of reasons, such as broken connectivity. Computers Troubleshooters provides high-quality, low-cost computer repair and troubleshooting services, as well as a variety of IT services such as backup and recovery, protection, remote assistance, as well as managed services.

Learn more about service only here:https://brainly.com/question/26660343

#SPJ4

When creating a time series–based forecast for the amount of soda to be sold in the cafeteria next week, which data sources can you include in your forecasting process?.

Answers

Answer:

Excel

Explanation:

Excel can be used for graphs and more

YOu are configuring the local security policy of a windows system. You wnat to prevent users from reusing old passwords. YOu also want to force them to use a new password for at least 5 days before changing it again. Which policies should you configure? (select two)
enforce password history
Password complexity
Maximum password age
Minimum password age

Answers

The  policies that you can configure is option A and D:

Enforce password historyMinimum password ageWhy is there a minimum password age?

The amount of time (in days) that a password can be used before the system asks the user to change it is determined by the Minimum password age policy setting. You can indicate that passwords never expire by setting the number of days to 0 or you can configure passwords to expire after a specific number of days between 1 and 999.

Therefore, number of new, distinct passwords that must be linked to a user account before an old password can be used again is set by the Enforce password history policy setting. Reusing passwords is a serious issue for any corporation.

Learn more about password history from

https://brainly.com/question/28114889
#SPJ1

using the printnum.s under examples in canvas, create a program that will have a variable called num initialized to 3. then it will print a menu selection to either square the num or do a minus 7 to it or quit. it will print the new value on square or minus. any other command should give an error. like so with the input being: smxsq enter s for square, m for minus 7, or q for quit: s 9 enter s for square, m for minus 7, or q for quit: m 2 enter s for square, m for minus 7, or q for quit: x invalid command enter s for square, m for minus 7, or q for quit: s 4 enter s for square, m for minus 7, or q for quit: q remember to use the printnum subroutine to print the value.

Answers

The code having a variable called num initialized to 3 is given below -

What is code ?


For the purposes of communication and information processing, a code is a set of principles that transforms information—such as a word, word, sound, image, or expression another form, sometimes shorter or secret, for storage on a storage device or for transmission over a communication channel. An early example is the invention of speech, which allowed people to express verbally what they were thinking, perceiving, hearing, or feeling to others. Nevertheless, speaking restricts the listener to those present at the time the speech is delivered and limits the communication range to the length a voice may travel.

CODE

.data

num: .word 3

 .text

 .globl main
main:

 la $a0, num

 lw $a0, 0($a0)

loop:

 li $v0, 4

 la $a0, prompt

 syscall

 li $v0, 12

 syscall

 move $t0, $v0

 beq $t0, 115, square

 beq $t0, 109, minus

 beq $t0, 113, quit

 j error

square:

 li $v0, 2

 mult $a0, $a0

 mflo $a0

 jal printnum

 j loop

minus:

 addi $a0, $a0, -7

 jal printnum

 j loop

quit:

 li $v0, 10

 syscall

error:
          li $v0, 4

 la $a0, error

 syscall

 j loop

printnum:

 li $v0, 1

 syscall

 jr $ra

prompt: .asciiz "enter s for square, m for minus 7, or q for quit: "

error: .asciiz "invalid command\n"

To know more about code
https://brainly.com/question/1603398
#SPJ4

C++
this program will store roster and rating information for a soccer team. Coaches rate players during tryouts to ensure a balanced team.
(1) Prompt the user to input five pairs of numbers: A player's jersey number (0 - 99) and the player's rating (1 - 9). Store the jersey numbers in one int vector and the ratings in another int vector. Output these vectors (i.e., output the roster).
Ex:
Enter player 1's jersey number:
84
Enter player 1's rating:
7
Enter player 2's jersey number:
23
Enter player 2's rating:
4
Enter player 3's jersey number:
4
Enter player 3's rating:
5
Enter player 4's jersey number:
30
Enter player 4's rating:
2
Enter player 5's jersey number:
66
Enter player 5's rating:
9

Answers

C++ program that stores and displays the elements of one or more lists. Output image of the algorithm is attached.

C++ code

#include<iostream>

using namespace std;

int main() {

   // Define variables

int jersey_number[5];

int pyer_rating[5];

int x;

// Entry data vectors

for (x=1;x<=5;x++) {

 cout << "Enter player" << x << "s jersey number (0 - 99): ";

 do {

  cin >> jersey_number[x-1];

 } while (!(jersey_number[x-1]>=0 && jersey_number[x-1]<=99));

 cout << "Enter player" << x << "s rating (1 - 9): ";

 do {

  cin >> pyer_rating[x-1];

 } while (!(pyer_rating[x-1]>=1 && pyer_rating[x-1]<=9));

}

// Output the roster

cout << "   " << endl;

cout << "**Player rating roster**" << endl;

cout << "   " << endl;

cout << "Jersey number   Rating " << endl;

for (x=1;x<=5;x++) {

 cout << "      " << jersey_number[x-1] << "           " << pyer_rating[x-1];

 cout << "   " << endl;

}

return 0;

}

To learn more about lists and vectors in c++ see: https://brainly.com/question/15088893

#SPJ4

The primary difference between simulation models and other types of spreadsheet models is that simulation models contain which of the following?
A. random numbers
B. output cells
C. constraints
D. deterministic inputs

Answers

The main difference between other spreadsheet models and simulation models is that the input variable cells in the simulation contain random numbers.

Random Numbers in Simulation Modeling

As the term suggests, random numbers are numbers that are chosen by chance at random, from a pool of numbers. All numbers in a given distribution have the same probability of being randomly selected.

Random numbers appear in a given distribution only when two conditions are met: Values are evenly distributed over a given interval or series, and it is impossible to predict future values based on past or present.

For numbers in sequence or distribution to be truly random, they must be independent. Numeral independence means that there is no correlation between successive numbers. In addition, these numbers should appear in the distribution with approximately the same frequency.

Learn more about Simulation Modeling : https://brainly.com/question/23844272

#SPJ4

If, as a result of inappropriate use of the strategic management process, performance data and activity reports indicate undesirable performance, then operational managers must: *
know about it so that they can correct the employee activity.
change the strategic management model.
immediately notify the board of directors.
allow sufficient time to pass to verify if it is the process or just the usage that is the problem.
check the performance data to ensure their accuracy and take two more measurements.

Answers

Option a is correct. They are aware of it and can change the employee's behavior.

Setting goals or objectives, conducting analysis, developing a plan, putting that strategy into action, and monitoring that approach are the five stages of the process. The strategic management approach entails more than just adhering to a set of guidelines. It is a way of doing business that is philosophical.

A field of management that deals with an organization's strategic goals is referred to as strategic management. This could involve creating the organization's vision, defining its operational goals, and developing and putting into practice the organization's strategy. Depending on the situation, it might also involve developing and implementing deviation correction measures. Strategic planning, a related but entirely independent field of management, should not be confused with the strategic management process.

To know more about management click here:

https://brainly.com/question/13265168

#SPJ4

in this section, you will be sending a specific pattern of packets to a simulated server. you will also be capturing the traffic to and from this simulated server. after sending the correct sequence of packets, the server should respond with a packet containing the unique key for your team. include the key and the solution file for full credit.

Answers

Implementing the appropriate controls and establishing policies for all system components is the responsibility of security engineering.

Making concessions is a necessary part of creating secure systems, much like in other technical fields. Any communication networks will be turned off, the system will be located in an electromagnetically insulated space with only authorized users having access to it, and only software that has undergone a rigorous audit will be used on a highly secure system. Most of our computer needs can't be met in that environment. We want to communicate with the world, download apps, and travel with our computers. Even with the extremely secure case, we still need to be worried about how access is controlled, who created the compilers and operating system, and whether authorized people can be forced to compromise the system.

Learn more about system here-

https://brainly.com/question/18825060

#SPJ4

The following is a selection from a spreadsheet:
Name Age Occupation
Agnes Shipton 44 Entrepreneur
Ronaldo Vincent 23 Accountant
Henry Sing 36 Editor
Krishna Bowling 62 Graphic Designer
What kind of data format does it contain?
Short
Narrow
Long Wide

Answers

Based on the selection from a spreadsheet, the kind of data format that it contain is option D: Wide.

What is wide data type?

There is One of two formats wide or long that can be used to write a dataset. Values that don't appear in the first column of a wide format are present. The first column of a long format is one that contain values that repeat.

The data is frequently is seen or referred to as being in "wide" format if there is one observation row per subject and each measurement is present as a different variable or as being in "long" format if there is one observation row per measurement when there are multiple measurements of the same subject taken over time or using different tools.

Hence, A time series of data that records the states (measurements) of multiple entities is presented in a tabular format called wide data format. Every table row in it contains all the information related to each individual entity, which is what makes it unique.

Therefore, based on the arrangement of the data, one can say that they are in a wide data format.

Learn more about data format from

https://brainly.com/question/28669485
#SPJ1

Given the selection from a spreadsheet that holds the above-stated information, it is correct to state that the kind of data format it contains is "Wide Data format" (Option D)

What is Wide Data Format?

A dataset can be written in one of two formats: broad or long. Values in a broad format do not repeat in the first column. A wide format comprises repeating values in the first column.

It is preferable to utilize the long format for data storage and the wide format at the end of a data collection and analysis to decrease data dimensionality. Using Pandas, converting from one format to another is as simple as writing one line of code.

Memo has the most storage capacity of any data type. It supports variable length and arbitrary format data storage. Memo datatype has two variants: CLOB and BLOB data types.

Learn more about Data Formats;
https://brainly.com/question/5531207
#SPJ1

Use a replacer array of JSON.stringify to return only the year, month and day properties of jsonStructure, and assign stringData with the result.
var jsonStructure = { "year": 2011, "month": 8, "day": 3, "hour": 8, "minute": 49 };
/* Your solution goes here */

Answers

Answer:

age

Explanation:

var jsonStructure = { "year": 2011, "month": 8, "day": 3, "hour": 8, "minute": 49 };

/* Your solution goes here */

question 14 how is the channelized t-1 rate of 1.544 mbps determined? a. 64 frames/second * ((24 ds0s/frame * 8 bits/ds0) * 1 fb) b. 8000 frames/second * ((24 bits/frame) 1 fb) c. 8000 frames/second * ((24 ds0s/frame * 8 bits/ds0) 1 fb) d. 64 frames/second * ((193 bits/frame * 8 bits/ds0) 1 fb)

Answers

The channelized t-1 rate of 1.544 Mbps determined by option c.

8000 frames/second ((24 DS0s/frame 8 bits/DS0) + 1 FB)

What is Mbps?

Megabytes per second is what Mbps stands for. There are 8 bits in a megabyte (like in Mbps above). Megabytes is a unit of measurement for the size of a file you're downloading or the volume of data that has been sent from the internet to your computer.

What Does Frames Per Second Mean?

A measure of display device performance used in video capture, playback, and video games is frames per second (FPS). FPS is a common metric used in video capture and playback when addressing video quality. It is used to measure frame rate, which is the number of images displayed consecutively each second.

To know more about Mbps, check out:

https://brainly.com/question/2536137

#SPJ1

A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Joe use for this subnet?
A. /24
B. /32
C. /28
D. /29
E. /30
E

Answers

In order to conserve address space, Joe should use the /30 subnet mask for this subnet.

What is a subnet mask?
The host bits and network bits are both set to all 0s to generate a 32-bit value known as a subnet mask. The subnet mask delineates the network and host addresses in the IP address in this manner.

Each device has a unique IP address that is made up of two parts: the client or host address and the server or network address. A DHCP server or a human being must either manually or automatically configure IP addresses (static IP addresses).

The subnet mask separates the IP address into the host and network addresses, designating which parts of the IP address belong to the network and which parts belong to the device.

To learn more about a subnet mask, use the link given
https://brainly.com/question/28390252
#SPJ4

the string 0111101111101111110 needs to be transmitted via the data link layer. after bit stuffing, what would the transmitted string actually look like?

Answers

The string that was actually transferred following bit stuffing is a Hamming code is used to convey messages of eight bits.

Explain about the Hamming code?

Data transmission or storage faults can be found and fixed using the error correction method known as Hamming code. It necessitates including more parity bits with the data. Error-correcting code (ECC) RAM frequently uses it.

The number of places at which two corresponding bits of data can differ is known in information technology as the Hamming distance. It is frequently employed in a variety of mistake correction processes or in the evaluation of opposing strings of data or pieces of information.

Hamming codes are perfect codes because they have a minimum distance of three and a block length that results in the highest achievable rate for codes. In order to automatically repair errors caused by punched card readers, Richard W. Hamming created the Hamming codes in 1950.

To learn more about Hamming code refer to:

https://brainly.com/question/14954380

#SPJ4

Other Questions
even as a child lisa was always impulsive and engaged in risky behavior. perhaps not surprisingly, she grew up to become a famous race car driver. Which of the following does not help to develop the "best" relationshipA. ChemistryB. ConvenienceC. CharacterD. Commitment which of the following is not a piece of evidence supporting the idea that an impact caused the mass extinction that occurred 65 million years ago? I need answers as soon as possible. a solid disk with a mass of 2.00 kg and a radius of 3.00 m is spinning with an angular velocity of 4.00 rad/s. what is the angular momentum of the disk? Miss Carter, a teacher, agrees more with Sternberg's theory of intelligence than Spearman's. Which of the following statements would reflect on this philosophy?Miss Carter believes each of her students have three types of intelligence: creative, analytical, and practical. Stephen is high in verbal linguistic abilities, so he must also excel in analytical abilities. Miss Carter evaluates the intellectual abilities of her students based on their IQ scores.Ruby is an all-around strong student with no specific strength or weakness in her abilities. or Miss Carter notices that her student Pierre works equally well in groups with others as he does when working alone. She concludes that all her students demonstrate multiple intelligences. A new edition of a very popular textbook will be published a year from now. The publisher currently has 1,000 copies on hand and is deciding whether to do another printing before the new edition comes out. The publisher estimates that demand for the book during the next year is governed by the probability distribution in the file P10_31.xlsx. A production run incurs a fixed cost of $15,000 plus a variable cost of $20 per book printed. Books are sold for $190 per book. Any demand that cannot be met incurs a penalty cost of $30 per book, due to loss of goodwill. Up to 1,000 of any leftover books can be sold to Barnes and Noble for $45 per book. The publisher is interested in maximizing expected profit. The following print-run sizes are under consideration: 0 (no production run) to 16,000 in increments of 2,000.I recommended the 6,000 decision.For your optimal decision, the publisher can be 90% certain that the actual profit associated with remaining sales of the current edition will be between what two values? If needed, round your answers to whole dollar amounts. 86) which of the following are defenses that some plants use against herbivory? a) production of the unusual amino acid canavanine b) release of volatile compounds that attract parasitoid wasps c) association of plant tissues with mycorrhizae d) a and b only e) a, b, and c Which tool can effectively increase the curl of the subjects lips? Teresa is maintaining a camp fire. She can keep the fire burning for 444 hours with 666 logs. She wants to know how many logs (y)(y)left parenthesis, y, right parenthesis she needs to keep the fire burning for 181818 hours. She assumes all logs are the same. How many logs does Teresa need to maintain the fire for 181818 hours? The first two political parties emerged whenThe men from Virginia intended to draft a new Constitution to replace the Articles ofConfederation.The issue of slavery divided Americans.George Washington announced that he would not run for a third term.John Quincy Adams was elected president amidst scandal. Which of the following outlines specific metrics and the minimum performance or availability level and outlines the penalties for failing to meet the metrics?A. QoSB. RDPC. SLAD. VPC Which graph shows y=2x3 ??? An exponential growth function represents a quantity that has a constantdoubling time.O A. TrueOB. False What is the theme of the poem below It is high time gender inequality like an unwanted waste Be dumped At the refuse dump It is high time We disemboweled the Body of gender classes And unequal sexes It is high time We quarantined polices And practices of Gender discrimination It is high time We planted the crop of Equally shared Household parenting It is high time We leveled down The tower of female Household parenting in this co-parenting category, the parents fought in front of the children and tried to undermine the relationship that the child had with the other parent. a. cooperative b. conflicted c. parallel d. structural select all the statements that describe the development and popularity of the piano in the early romantic period. multiple select question. the demand for new piano music increased. the music publication business became less profitable. the number of piano teachers increased. the interest of the public in attending live music performances increased. a keypad at the entrance of a building has 10 buttons labeled 0 through 9. what is the probability of a person correctly guessing 8 digit entry code although the symptoms of depression vary among people, what is one symptom that tends to be present in most people who are experiencing depression? Which symptom of schizophrenia is described as a false belief that is maintained even though it is irrational?.