1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masha68 [24]
2 years ago
10

_____ is a combined automated machines, robots, and materials handling system that is controlled by a single computer.

Business
1 answer:
Ivanshal [37]2 years ago
3 0

Answer:

Flexible manufacturing system

Explanation:

Hope this helps! :)

You might be interested in
You have discovered that for a certain group of stocks, large positive price changes are always followed by large negative price
scoray [572]

Answer:

Strong form

Explanation:

Efficient market hypothesis states that all information about a set of investment in a market is readily available, so it is impossible to beat the market and make unusual profit.

There are different forms that looks at the availability of public and non public information in the market system and their effect on stock prices.

The strong form of the efficient market hypothesis states that both public and non public information is accounted for in the price of a stock, therefore there is no way an investor can make unusual profit.

If a certain group of stocks have large positive price changes followed by large negative price changes, it is a violation of strong form of the efficient market hypothesis.

5 0
3 years ago
The opportunity cost of an action is
gogolik [260]

Answer:

d. the highest valued alternative forgone as the result of choosing an option

Explanation:

An opportunity cost is anything that you sacrificing one thing for the other due to lack of recources and Scarcity of time

For example leisure time and working hours

6 0
3 years ago
The United States Navy purchases uniforms from a single supplier. For the last twenty-five years, the trousers purchased from th
SVETLANKA909090 [29]

Answer:

C. straight rebuy

Explanation:

Straight rebuy -

It is the method , when the customer purchases another identical goods in the  same amount with the same terms and condition , from the very same supplier , is known as straight rebuy .

Hence , from the question ,

The United States Navy buys uniform from the same supplier for the last 25 years .

Therefore ,

the information given in the question is about straight rebuy .

8 0
3 years ago
While discussing approaches to boost organization productivity, rene, the president of an auto manufacturer, was interested in a
Lesechka [4]
It seems that you have missed the necessary options for us to answer this question so I had to look for it. Anyway, the answer that would best complete the given statement above is the word CLASSICAL. <span>While discussing approaches to boost organization productivity, rene, the president of an auto manufacturer, was interested in a rational approach that through the application of scientific methods, time and motion studies, and job specialization found it is possible to increase productivity. This is the essence of the CLASSICAL viewpoint. Hope this helps.</span>
5 0
4 years ago
ssume you are the Chief Information Officer (CIO)1 of the company that you dream of (any company, real or hypothetical). Give a
MAVERICK [17]

Answer: External threats are almost always malicious, with data theft, vandalism, and disruption of services all possible goals. Internal threats can be equally vicious and may also include blackmail or other illicit activities. Internal threats, however, are not always malicious

Internal threats originate from within the organization. The primary contributors to internal threats are employees, contractors, or suppliers to whom work is outsourced. The major threats are frauds, misuse of information, and/or destruction of information.

Explanation: An internal threat refers to the risk of somebody from the inside of a company who could exploit a system in a way to cause damage or steal data.

Employee Sabotage and Theft. ...

Unauthorized Access by Employees.

Weak Cyber Security Measures and Unsafe Practices. ...

Accidental Loss or Disclosure of Data

The following are ways to prevent Internal and External Security Threats :

1. Access data vulnerabilities, Penetration testing tools can be adopted to check the vulnerabilities or weak areas in the software systems. ...

2. Calculate Risk Scores. ...

3. Train Your Workforce. ...

4.Remove excessive privileges. ...

5.Encrypt Data. ...

6. Embrace the cloud.

8 0
3 years ago
Other questions:
  • Ted wanted to determine if one brand of paper towels​ (brand
    7·1 answer
  • A book publisher has fixed costs of $380,000 and variable costs per book of $11.00. the book sells for $27.00 per copy.
    12·1 answer
  • Assume a division of Hewlett-Packard currently makes 8,000 circuit boards per year used in producing diagnostic electronic instr
    5·1 answer
  • "A customer has a 3-year old child and wishes to begin saving for the kid's college education using a tax advantaged investment.
    6·1 answer
  • Quality, personal attention, leadership, and respect are examples of what? A. A company's values B. A company's mission statemen
    11·2 answers
  • Based on the 1790 U.S. Census, the National Archives estimates that only 20.7 percent of the U.S. population were white males si
    9·1 answer
  • Who is responsible for managing the entire wardrobe of a theatrical production once performances begin?
    7·1 answer
  • A typing instructor builds a regression model to investigate what factors determine typing speed for students with two months of
    13·1 answer
  • Most small animal private veterinary practices employ __________ veterinary assistant(s) for each veterinary technician on staff
    10·2 answers
  • Which best explains why there are many job opportunities in the Lodging pathway?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!