1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
4 years ago
8

Answer all of the questions correctly and you will be amazing. Fill in Blanks

Computers and Technology
1 answer:
Naya [18.7K]4 years ago
5 0
A.Chicken Street
B.You just got Vectored
You might be interested in
Describe a situation where it would be appropriate to use each of the six leadership styles described by Daniel Goleman
polet [3.4K]

Answer:

Find the explanation below.

Explanation:

The six leadership styles described by Daniel Goleman are the;

1. Authoritative: This is applied when the leader wants to motivate a team to achieve greater heights. For example, in a group where the leader expects his team members to complete a project at a specific time,  he comes up with an idea of how they can meet the goal. He tells the group excitedly about this idea. The group in turn now shares this same excitement and gets to work applying the new ideas.

2. Coaching: This is used by the leader to encourage employees who lack motivation. Imagine that an employee known to be efficient at his work is finding it difficult to reach a sales goal. The leader observes this and encourages him, showing him better ways to improve his sales skills. He applies the idea and gets better at his job.

3. Affiliative: The affiliative leader seeks to resolve conflict by connecting people and building their spirits. In a case where the team members are feeling downcast because their well-loved boss is transferred to another branch, the new affiliative leader builds their spirit and helps them get back to work.

4. Democratic: This is needed when the leader seeks opinions from his subordinates. If the company is seeking to make changes to be at par with a competitor, the democratic leader welcomes a variety of opinions from his subordinates on new ways to improve their products and services.

5. Pacesetting: This type of leader leads the way and shows good example. After the leader has shown the group new ways to improve their sales, he applies the same approach in his marketing and has significant results.

6. Coercive: The leader applies this with difficult employees. In a situation whereby an employee has been encouraged on how to improve his skills but he still shows no much improvement, the coercive leader authoritatively tells him to make the needed effort since his job is on line. He shows signs of improvement and the leader uses lighter measures to calm his fears.

3 0
3 years ago
write a function that counts the number of times the value of y occurs in the first n values in array x. y is an integer variabl
mixer [17]

Answer:

Following are the function of count:

void count(int y,int x[],int n) // function definition of count

{

int k,count=0;  // variable declaration

for(k=0;k<n;++k) // iterating over the loop

   {

   if(x[k]==y) //check the conndition number of times the value of y occurs

   {

   count++; // increment of count by 1

   }

   }

Explanation:

Following are the code in c language

#include <stdio.h> // header file  

void count(int y,int x[],int n) // function definition of count

{

int k,count=0;  // variable declaration

for(k=0;k<n;++k) // iterating over the loop

   {

   if(x[k]==y) //check the conndition number of times the value of y occurs

   {

   count++; // increment of count by 1

   }

   }

   printf(" the number of times the value of y occurs :%d",count); // display count value

   }

int main() // main method

{

   int x[100],y,n,k; // variable declarartion

   printf(" Enter the number of terms n :");

   scanf("%d",&n); // input the terms

   printf(" Enter the array x :");

   for(k=0;k<n;++k) // input array x

   {

   scanf("%d",&x[k]);

   }

   printf("Enter the value of y:");

   scanf("%d",&y);// input value y by user

    count(y,x,n); // calling function

   return 0;

}

In the given program we declared an array x ,variable  y and n respectively Input the array x ,y,n  by user after that we call the function count .In the count function we iterate the loop from o position to array length-1 and check the number of times the value of y occurs by using if statement  i.e  if(x[k]==y) if the condition of if block is true then we increment the count variable Otherwise not .Finally display the count variable which describe the number of count.

Output

Enter the number of terms n :5

1

2

2

56

5

Enter the value of y:2

the number of times the value of y occurs :2

Enter the number of terms n :5

1

2

3

56

5

Enter the value of y:26

the number of times the value of y occurs :0

7 0
3 years ago
If your computer won't connect to the internet, which of these is most likely to be the problem?
Setler79 [48]

Answer: just like rtyguj said, RAM, ROM, and O USB are all built into your computer so it would be onic

8 0
3 years ago
Which of the following is an attack that adds SQL statements to input data for the purpose of sending commands to a database man
liq [111]

Answer: SQL Injection

Explanation:

The SQL injection is one of the type of attack which is used in the database management system for sending the commands by adding the structured query (SQL) language statement in the form of input data.

  • The SQL injection is the technique of code injection in which the SQL statement for the purpose of sending commands.  
  • It is widely used in the data driven applications.
  • The various types of web applications and web pages are used the SQL injection and uses in the form of input in the SQL query and then it is executed in the database.

Therefore, The SQL injection is the correct option.

5 0
3 years ago
Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing the
zvonat [6]

Answer:

wireless LAN

Explanation:

An extranet is a network area where people or corporate partners external to the company access data. An intranet simply describes the network area that is normally accessed only by internal personnel. The wired LAN is affected by BYODs (bring your own devices) when the devices attach to the wired network. A college wireless LAN is most likely used by the tablet and smartphone. A wireless WAN would more likely be used by college students to access their cell provider network.

3 0
4 years ago
Other questions:
  • Let K(x, y) denote the statement "x knows y" and D denote the domain of all people. Express the following English sentences as a
    9·1 answer
  • The two variables causing the point of difference between the time codes are the frequency and the count
    6·1 answer
  • What risks and safeguards are associated with wireless communication? what is “war driving” or “war flying”? are you comfortable
    14·1 answer
  • Search engines enable you to
    9·2 answers
  • Software on your computer is taking a long time to load. What could help solve this problem?
    5·1 answer
  • The user does not need to highlight data within an Excel worksheet in order to remove conditional formatting. True or false
    14·1 answer
  • If the user loads this graphic in a text only browser how will the browser describe it?
    11·2 answers
  • What is an example of an attribute for a screen object
    14·1 answer
  • a deque is a type of collection,but it is not automatically available when you open IDLE. What is missing that allows you to use
    14·2 answers
  • Which of the following is the fastest computer processing speed?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!