Which of the following is not a characteristic of a structured decision?
The first three phases of the decision-making process need not occur in any particular sequence.
Structured
________ decisions are more common at lower organizational levels.
Operational control
_____ is the efficient and effective execution of specific tasks.
unstructured
When there is no well-understood or agreed-on procedure for making a decision, the decision is said to be:
Users didn't have the right tools to access the data.
Refer to the Opening Case - Quality Assurance at Daimler AG: Which of the following best describes Daimler's Quality Information System (QUIS)?
digital dashboards
Which of the following information systems are very user friendly, supported by graphics, and provide exception reporting and drill down?
The number of alternatives is decreasing.
Which of the following is not a reason why managers need IT support?
implementation
Success in the _____ phase of the decision-making process results in resolving the original problem, and failure leads to a return to previous phases.
interpersonal
Being a figurehead and leader is part of the _____ managerial role.
PLS HELP IF U KNOW A LOT ABT SOCIAL MEDIA
Idk what’s going on with Pinterest but I can’t follow ppl, dm ppl or comment on stuff and it says an error (attached image) what can I do to fix this? Also I’ve tried logging in and out and I’ve tried deleting the app. Btw it’s on a business account
Answer:
Its probably your computer
Explanation:
Try restarting, shutting down and starting back up your computer/laptop. Or just move to a different device.
please help anyone plss the code for the html to create an website plsss anyone PLSSSSS and i will mark u as brainliest forever
Answer:ater on, in Chapter 9, you'll learn to put web pages online so anyone with a web ... Every web page you build along the way will be a bona fide HTML document. ... That means that the raw code behind every web page you create will consist entirely ... punctuation marks, and everything else you can spot on your keyboard).
Explanation:
If an app asks for a user's age, it may be because the app requires a user to be over a certain age to use some of the services it provides. Write a function called checkAge that takes one parameter of type String. The function should try to convert this parameter into an Int value and then check if the user is over 18 years old. If he/she is old enough, print "Welcome!", otherwise print "Sorry, but you aren't old enough to use our app." If the String parameter cannot be converted into an Int value, print "Sorry, something went wrong. Can you please re-enter your age?" Call the function and pass in userInputAge below as the single parameter. Then call the function and pass in a string that can be converted to an integer.
Go back and update your function to return the age as an integer. Will your function always return a value? Make sure your return type accurately reflects this. Call the function and print the return value.
func checkage(age: String)->Int?
{
if let age_type = Int(age)
{
if age_type > 18 {
return "Welcome!"
}
else if age_type < 18 {
return"Sorry, but you aren't old enough to use our app."
}
}
else {
return "Sorry, something went wrong. Can you please re-enter your age?"
}
return age_type
}
Answer and Explanation:
Here the programming language swift is being used. There is a slight error in the program shown above:
var userInputAge=9
func checkage(age: String)->int?
{
if let age_type = Int(age)
{
if age_type > 18 {
return "Welcome!"
}
else if age_type < 18 {
return"Sorry, but you aren't old enough to use our app."
}
}
else {
return "Sorry, something went wrong. Can you please re-enter your age?"
}
return age_type
}
The program should be revised :
func checkage(age: int?)->String
{
if let age_type = Int(age)
{
if age_type > 18 {
return "Welcome!"
}
else if age_type < 18 {
return"Sorry, but you aren't old enough to use our app."
}
}
else {
return "Sorry, something went wrong. Can you please re-enter your age?"
}
return age_type
}
We call the functions :
checkage(userInputAge)
checkage("15")
Note: we revised the program for errors in the first line of the code where the int optional parameter(int?) was supposed to be used instead of the String parameter in the function. We then called the function using the userInputAge variable defined as the parameter and then we now also used a String as the parameter for calling the function the second time.
Answer:
def checkage(age: "String")->int:
if age >= 18:
return "Welcome!"
return "Sorry, but you aren't old enough to use our app."
for _ in iter(list,0):
myage = int(input("Please enter your age: "))
if myage is int(myage):
result = checkage(myage)
print(result)
break
print("Sorry, something went wrong. Enter integer value as age.")
Explanation:
The python code above lets the user input the age value for continuous comparison. If the age is an integer, it checks to know if the age is greater than 18 or not. If yes, it returns "Welcome!" else "Sorry, but you aren't old enough to use our app". But if the age is not an integer, it displays the message "Sorry, something went wrong. Can you please re-enter your age?" then prompts the user again for the age.
Note: the ': "String" ' and "->int" is for documentation purposes. They are used to describe the type of parameters (for later) and return value (the former).
what is the advantages of your solutions
Answer:
One of the key benefits of using IT solutions is that they provide the opportunity to use the latest technology in the market. This is because the IT solution always offers the best equipment and technologies in the market, and also, they are upgraded at zero additional costs.
Explanation:
Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
Author
Editor
Contributor
Reviewer
The role that will grant a delegate read-only access to a particular workspace within a user's Outlook mailbox is the "Reviewer" role.
In Outlook, delegates are individuals who are granted permission to access and manage another user's mailbox on their behalf. When assigning delegate permissions, different roles can be assigned to control the level of access the delegate has.
The "Reviewer" role specifically provides read-only access to the specified workspace within the user's mailbox. Delegates with this role can view the content, including emails, calendar events, and other items, but they cannot make any changes or modifications.
On the other hand, the "Author" role grants read and write access, allowing delegates to create, modify, and delete items within the designated workspace. The "Editor" role also provides read and write access but includes additional privileges such as creating subfolders and managing permissions.
The "Contributor" role allows delegates to create items within the workspace, but they cannot view items created by others. It provides a limited level of access compared to the "Reviewer" role.
Therefore, if a delegate needs read-only access to a particular workspace within a user's Outlook mailbox, the "Reviewer" role should be assigned.
For more questions on Reviewer, click on:
https://brainly.com/question/30517194
#SPJ8
The single-cycle datapath conceptually described in this section must have separate instruction and data memories, because:________. a. the formats of data and instructions are diff erent in MIPS, and hence different memories are needed. b. having separate memories is less expensive. c. the processor operates in one cycle and cannot use a single-ported memory for two different accesses within that cycled. the formats of data and instructions are different in MIPS, and hence different R-type instructions are needed .
Answer:
C. The processor operates in one cycle and cannot use a single-ported memory for two different accesses within that cycle
Explanation:
Processors require instructions and data which are retrieved from data memories for processing, but it cannot access two or receive two both processes as only a port is used for accessing data and another for receiving instructions. In fact, a single-cycle or single-clock processor cannot use a resource more than once.
what are the characteristics of 1st generation computers
Answer:
Used vacuum tubes for circuitry.
Electron emitting metal in vacuum tubes burned out easily.
Used magnetic drums for memory.
Were huge, slow, expensive, and many times undependable.
Were expensive to operate.
Were power hungry.
Explanation:
Answer:
Characteristics of first generation computers:Explanation:
1)First generation computers used vacuum tubes.
2)Speed was slow and memory was very small.
3)They were huge in size taking up entire room.
4)They consumed a lot of power and generated so much heat.
5)Machine language was used in these computers.
6)Output was obtained on printouts through electric typewriter.
7)Input was based on punched cards.
8)First generation computers were expensive and unreliable.
Is this right? I’m not sure
For python, Write a function named getResults that accepts radius of a sphere and returns the volume and surface area. Call this function with radius = 3.5 , and display results in one decimal format.
volume = 4/3 * pi * r ^ 3
Surface Area = 4pi * r ^ 2
import math
def getResults(r):
return "Volume = {}\nSurface Area = {}".format(round((4/3)*math.pi*(r**3),1), round((4*math.pi)*(r**2),1))
print(getResults(3.5))
I hope this helps!
what are the advantages of using a folder?
Answer:
1. easy access to files
2. better organization
Explanation:
Clyde Clerk is reviewing his firm’s expense reimbursement policies with the new salesperson, Trav Farr. "Our reimbursement policies depend on the situation. You see, first we determine if it is a local trip. If it is, we only pay mileage of 18.5 cents a mile. If the trip was a one-day trip, we pay mileage and then check the times of departure and return. To be reimbursed for breakfast, you must leave by 7:00 a.m., lunch by 11:00 a.m., and have dinner by 5:00 p.m. To receive reimbursement for breakfast, you must return later than 10:00 a.m., lunch later than 2:00 p.m., and have dinner by 7:00 p.m. On a trip lasting more than one day, we allow hotel, taxi, and airfare, as well as meal allowances. The same times apply for meal expenses." Write structured English for Clyde’s narrative of the reimbursement policies. Draw a decision tree.
Answer:
The answer is described in the image.
Explanation:
The firm is responsible for all expenses made by it's employees, so for a local trip, the cost of gas relative to the mileage covered during the journey is paid for ( 18 cents per mileage).
If it is not a local trip, then it is a one-day trip, so the firm pays for the mileage and the cost of the meals not taken in the company, which depends on the departure and return/arrival time. If the departure and return time is 7am to 10am, the employee is paid for breakfast, if the departure and return is 11am to 2pm then the employee is paid for lunch, and for dinner, 5pm to 7pm.
What is the extension of Qbasic ?
Answer:
bas
Explanation:
Which traits are common in all four career pathways of the Information Technology field? Check all that apply.
A)accuracy and attention to detail
B)problem-solving and critical-thinking skills
C)knowledge of programming language
D)ability to work independently
E)ability to protect confidential information
F)ability to learn quickly
Answer:
Abcd
Explanation:
In order to make schemas that will appear in the Schema Library available in the XML Options dialog box, what file extension should a user give to schemas?
--.xml
--.xsl
--.xslt
--.xsd
Answer:
You can use your XML parser
Explanation:
hope this helps!
One of the systems analysts on the project team thought that he did a good job of designing the company’s tech support webpage, but his supervisor isn’t so sure. His supervisor is concerned that the design is very similar to a page used by the company’s major competitor, and she asked him whether he had used any HTML code from that site in his design. Although the analyst didn’t copy any of the code, he did examine it in his web browser to see how they handled some design issues. The supervisor asked the analyst to investigate webpage copyright issues and report back to her. In his research, the analyst learned that outright copying would be a copyright violation, but merely viewing other sites to get design ideas would be permissible. What is not so clear is the gray area in the middle. The analyst asked you, as a friend, for your opinion on this question: Even if no actual copying is involved, are there ethical constraints on how far you should go in using the creative work of others? How would you answer?
Explanation:
Although the system analyst only viewed the HTML code as a major competitor not outrightly copying their code, however, since there are relatively few legal frameworks on this matter, it important to note some ethical issues or constraints that may arise:
Copying the design pattern of the competitors' webpage may result in legal fillings by the competitors which may claim the other company stole its intellectual designs without permission.Such actions may result in other competitors carrying out the same strategy on the company.plsss help anyone PLSSSSS
Answer:
The answer to this question is given below in the explanation section.
Explanation:
This question is about to write HTML code for the given sub-questions. In each sub-question different scenario is given. So, the answer to these questions is given below in the order they asked.
1. In this question it is asked to write a code of 5 students' name in a paragraph with a different color that make them unique.
<html>
<body>
<p style="color:red;">Student A</p>
<p style="color:blue;">Student B</p>
<p style="color:black;">Student C</p>
<p style="color:orange;">Student D</p>
<p style="color:green;">Student E</p>
</body>
</html>
2. In it, the below is given code show an ordered list of subjects that you're offering.
<html>
<body>
<h2>An ordered HTML list</h2>
<ol>
<li>Introduction to Computing</li>
<li>Communication Skills</li>
<li>Software Designing</li>
</ol>
</body>
</html>
3. The below-given HTML code shows the unordered list of parts that make up the computer.
<html>
<body>
<h2>An unordered HTML list</h2>
<ul>
<li>CPU</li>
<li>RAM</li>
<li>Motherboard</li>
<li>Mouse</li>
<li>Keyboard</li>
<li>Monitor</li>
</ul>
</body>
</html>
This elementary problem begins to explore propagation delay and transmis- sion delay, two central concepts in data networking. Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters, and suppose the propagation speed along the link is s meters/sec. Host A is to send a packet of size L bits to Host B
a. Express the propagation delay, dprops in terms of m and s
b. Determine the transmission time of the packet, drans, in terms of L and R.
c. Ignoring processing and queuing delays, obtain an expression for the end-
d. Suppose Host A begins to transmit the packet at time t = 0. At time t = dtrans'
e. Suppose drop is greater than dran . At time t = d, ans, where is the first bit of
f. Suppose dprop is less than dtrans. At time t = dtrans, where is the first bit of
g. Suppose s = 2.5-108, L = 120 bits, and R = 56 kbps. Find the distance m so that dprop equals drans
Answer:
A. dprops = m /s seconds.
B. drans = L / R seconds.
C. delay(end −to−end) = (m /s + L / R) seconds.
D. The bit has just been sent to Host B or just left Host A.
E. The first bit is in the link and has not reached Host B.
F. The first bit has reached Host B.
G. m = 535.714 km.
Explanation:
The transmission time or delay of packets in a network medium is the packet size L, divided by the bit rate R (in seconds). The propagation time or delay is the ratio of the distance or length of the transmission cable, m, and the propagation speed of the cable, S (in seconds).
The end-to-end delay or the Packet delivery time is the total delay in transmission, which is the sum of the propagation delay and the transmission delay.
To get the distance where the propagation delay is equal to the transmission delay;
distance (m) = L /R
= (120/56 ×10^3) 2.5 ×10^8 = 535.714 km
For which input values will the following loop not correctly compute the maximum of the values? 1. Scanner in = new Scanner (System.in); 2. int max =
Answer:
The answer is "Option d".
Explanation:
Please find the complete question in the attached file.
Which of these can be sorted with a bubble sort?
['red', 'blue', 'green', 7]
{41:5,32:10, 20: 234}
[7, 10, 2.5, 1.566]
[1, 2.5, 'book']
Answer:
C
Explanation:
ed 2021
3. You have set up your Android phone using one Google account and your Android tablet using a second Google account. Now you would like to download the apps you purchased on your phone to your tablet. What is the best way to do this?
a. Set up the Google account on your tablet that you used to buy apps on your phone and then download the apps.
b. Buy the apps a second time from your tablet.
c. Back up the apps on your phone to your SD card and then move the SD card to your tablet and transfer the apps.
d. Call Google support and ask them to merge the two Google accounts into one.
Answer:
a. Set up the Google account on your tablet that you used to buy apps on your phone and then download the apps.
Explanation:
Any suggestions on how to write the following Python code?
1. Write a Python code to save the following list in a CSV file
ls = [“Hello”, “Hi”, “bye”]
2.Write a Python to read the CSV file generated in the previous step (1) to a Python list.
Help would be much appreciated.
Answer:
Hi
Explanation:
how microsoft excel helps students?
Answer:
FASLE
Explanation:
Internet routing:_________. A. precomputes the most efficient route and uses it to ensure rapid packet delivery. B. broadcasts all packets to all hosts so the recipient will be sure to see its traffic. C. makes routing decisions one at a time as a packet crosses individual networks. D. uses port numbers to optimize the transmission of streaming media.
Answer:
A. precomputes the most efficient route and uses it to ensure rapid packet delivery.
Explanation:
In simple words, what Internet routing means is a process where a router decides which path data packets should follow that are more efficient in delivering the packets across computers.
For example, we can liken the process to the duties of a tour guide in a museum or large building in directing visiting guests who came to explore the museum.
can be referred to as a universal network of interrelated computers which delivers a very wide variety of information and communications facilities to organizations and individual users.
A)Global Communication
B)Social Media Platform
C)Internet
D)Technological Advancement
Answer:
Internet
Explanation:
just took the test and got A
Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and then deque elements. Which indices of the internal array elements hold the remaining elements? a) 0 to 2 b) 7 to 9 c) 2 to 4 d) 1 to 3
Full question:
Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and then deque 2 elements. Which indices of the internal array elements hold the remaining elements? a) 0 to 2 b) 7 to 9 c) 2 to 4 d) 1 to 3
Answer and Explanation:
If you instantiate a capacity of 10 for the queue, you have the queue a capacity of not more than 10 values.
To enqueue means to add an element to the array(if it's not full, n<10)
To dequeue means to delete an element from the array or queue(if n! =0)
From the question, for example:
We create a queue of capacity 10:
Queue q(10);
We add elements/enqueue 5 elements to the queue :
q.queueEnqueue(10);
q.queueEnqueue(5);
q.queueEnqueue(8);
q.queueEnqueue(9);
q.queueEnqueue(2);
If we print this out:
q. queueDisplay()
We would get:
10, 5, 8, 9, 2
We remove elements/dequeue 2 elements from the queue :
q. queuedequeue();
q. queuedequeue();
We print it out:
q. queueDisplay()
8 ,9, 2
We observe that deletion/dequeue starts from the front/first index.
We are left with indices 2, 3, 4 or 2 to 4
Note: the above methods/ functions and objects used are merely for example purposes. The queue uses a floating front design approach.
Find the minimum, maximum, and average grade of final exams in sections taught by Todd Smythe.
Answer:
A sample of the statement is written below
SELECT MIN(GRADE), MAX(GRADE), AVG(GRAD), FROM TABLE 2 WHERE TEACHER = "TODD SMYTHE"
Explanation:
To find the Minimum, maximum and average grade of final exams in the sections taught by Todd Smythe. we will write a statement
Using the select to get the required data using the functions ; MIN , MAX , AVG and the WHERE clause for the condition
A sample of the statement is written below
SELECT MIN(GRADE), MAX(GRADE), AVG(GRAD), FROM TABLE 2 WHERE TEACHER = "TODD SMYTHE"
Using the programming language of your choice, implement the Binary Search algorithm for a target value = 9 on the Array A: [9, 11, 70, 25, 20, 0, 36, 24]. What is the primary condition to implement a Binary Search Algorithm? Explain the growth rate of the algorithm
Answer:
myArray = [9, 11, 70, 25, 20, 0, 36, 24]
myvalue = 20
def binary_search(mylist, value):
sorted(mylist)
mid = mylist[round(len(mylist) / 2)]
if value == mid:
return mylist.index(mid)
elif value < mid:
for index, s_one in enumerate(mylist[ : (mylist.index(mid))]):
if s_one == value:
return index
elif value < mid:
for index, s_two in enumerate(mylist[(mylist.index(mid)) : ]):
if s_two == value:
return index
else:
return "searched value not in list/array"
result = binary_search( myArray, myvalue)
print(f"Index of the searched value {myvalue} is: {result}")
Explanation:
The programming language used above is python. It is used to implement a binary search in a list and finally returns the index of the searched value.
Retail products are identified by their Universal Product Codes (UPCs). The most commonform of a UPC has 12 decimal digits: The first digit identifies the product category, the nextfive digits identify the manufacturer, the following five identify the particular product, andthe last digit is acheck digit. The check digit is determined in the following way:
• Beginning with the first digit multiply every second digit by 3.
• Sum all the multiplied digits and the rest of the digits except the last digit.
• If the (10 - sum % 10) is equal to the last digit, then the product code is valid.
• Otherwise it is not a valid UPC.The expression is:sum= 3.x1+x2+ 3.x3+x4+ 3.x5+x6+ 3.x7+x8+ 3.x9+x10+ 3.x11where the x’s are the first 11 digits of the code.
If you choose to add the last digit also in the second step and if the sum is a multiple of 10,then the UPC is valid. Either way, you still need to perform the modular division to checkwhether the given number is a valid code.In this problem, you need to use either a string or long long integer type for the product codebecause it is 12 digits long. If you use string, you can convert one character substring of thestring in to a single digit integer from left to right using the function stoi(str.substr(i,1)).This way you do not need to get last digit of the number and then divide the number by 10.
in c++
problem 3
Translate the following pseudocode for randomly permuting the characters in a string into a C++ program. Read a word. repeat word.length() times Pick a random position i in the word, but not the last position. Pick a random position j > i in the word. swap the letters at positions j and i. Print the word. Please work on this problem after we learn to generate random numbers in the class which is on Wednesday the latest. These problems only deal with simple loop while, for and do loops. You will get a second set of problems next week on nested loops.
Answer:
#include <iostream>
#include <cmath>
using namespace std;
int main(){
string upc;
char last;
cout<< "Enter UPC number: ";
cin >> upc;
if (upc.size() == 12){
last = upc[-1];
} else{
return 0;
}
cout<< last;
char myArr[upc.length()];
for (int i = 0 ; i < upc.substr(0,11).length(); ++i){
if (upc[i]%2 != 0){
myArr[i] = upc[i] * 3;
}
else{
myArr[i] = upc[i];
}
}
int sum = 0;
for (int x = 0; x < sizeof(myArr); ++x){
sum += (int)myArr[x] - '0';
}
if (sum% 10 == last){
cout<<"UPC number is valid";
}
else{
cout<<"Invalid UPC number.";
}
}
Explanation:
The UPC number in the c++ source code input must be 12 digits long for the rest of the code to execute. The code checks the validity of the number by comparing the reminder of the sum division with the last digit in the UPC number.
It is acceptable to create two TCP connections on the same server/port doublet from the same client/port doublet. True False
Answer:
False
Explanation:
would be blocked from server
Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order). The memory allocation algorithm that is used to place processes of size 115 KB, 500 KB, 358 KB, 200 KB, and 375 KB in the following order is the _______________.
Answer:
The memory allocation algorithm that is used to place the processes given is the First Fit Algorithm
Explanation:
The First Fit Management Algorithm works by ensuring that the pointer keeps track of all the free spaces in the memory and accepts and executes all instructions to allocate a memory block to the coming process as long as it is big enough to hold the size of the process.
For example, the First Fit algorithm will allocate the processes in the first block that fits (that is, if it can fit the memory bock in the queue, then the process will be store)
It will work as follows (recall that the memory partitions are in order and must remain so):
A) 115 KB is stored in 300KB block, leaving the following free spaces (185KB, 600KB, 350KB, 200KB, 750KB, 125KB), next
B) 500 KB is store in a 600KB block leaving the following free spaces (185 KB, 100 KB, 350 KB, 200 KB, 750 KB, 125 KB), next
C) 358 KB is stored in 750KB block, leaving the following free spaces (185KB, 100KB, 350KB, 200KB, 392KB, 125KB) next
D) 200 KB is stored in 350KB block, leaving the following free spaces (185 KB, 100 KB, 150KB, 200KB, 392KB, 125KB) next
E) 375KB is stored in 392KB block leaving (185KB, 100KB, 150KB, 200KB, 17KB, 125KB)
One of the demerits of this Algorithm is that, as shown above, memory is not maximized. It however is one of the easiest algorithms amongst all the other memory allocation processes.
Cheers