1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elza [17]
4 years ago
7

Peter is working on a project. He feels that the parameters need to be changed to meet the client specifications. First he must

talk to his immediate supervisor, who then discusses the issue with her department director. Peter is mostlikely part of which type of small-group network?
A) vertical
B) direct
C) chain
D) all-channel
E) box
Computers and Technology
1 answer:
11111nata11111 [884]4 years ago
8 0

Answer:

C) chain

Explanation:

Small group network comprises of a vertical, direct, chain, all channel and box network

The vertical network is a network that is made for some specific purpose or goal of the business organization.

The direct network is a network that is directly interrelated to each other.

The chain network is that network in which the formal chain of command follows through which proper  communication can be done in all the departments without any barriers to a communication network

It also shows that each member can communicate the person below and above their position only in a vertical hierarchy. It follows the top-down approach

This all channel network follows an informal communication network through which anyone can communicate with anyone at any time with following any chain of the business organization

The box network covers all the things in one network. Like -  various software, packages, etc

In the given case Peter is asking permission from the supervisor and supervisor is discussing with the department director, is showing the formal chain of command that's why according to the given scenario the most appropriate answer is chain network.

You might be interested in
What did the strict study generally find about the effect of internet use on sleep?
rjkz [21]
A. should be the answer hope this helps :)
4 0
3 years ago
Read 2 more answers
Which blog had legal content and is written mostly by lawyers
Svetradugi [14.3K]
Is it asking for a web site like .edu? or something like that?
6 0
3 years ago
Read 2 more answers
While ________ is centered on creating procedures, ________ is centered on creating objects. Procedural programming, class progr
AlexFokin [52]

Answer

Procedural programming, Object-oriented programming

Explanation

Procedural programming is a type of computer programming language that specifies a series of well structured steps and procedures  within its development period of time. It contains a systematic order of statements, functions and commands to complete a computational task or program. It is centered on creating procedures. While object oriented programming is a programming language that is centered on creating objects rather that actions and data rather than logic.. It has four principles which are inheritance, polymorphism, abstraction and Encapsulation


4 0
3 years ago
A consumer purchases an exploit from the dark web. The exploit targets the online shopping cart on a popular website, allowing t
Bond [772]

Answer:

Script Kiddie

Explanation:

According to my research on Black Hat Hackers, I can say that based on the information provided within the question the term that best describes this type of user is called a Script Kiddie. This is known as a person who uses already created computer scripts to hack into computers since they do not have the skills to write the scripts themselves.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
3 years ago
________ is the information about a file.
GalinKa [24]
Properties is the information about the file
4 0
3 years ago
Other questions:
  • Which of the following statements is true?
    6·1 answer
  • Tell me about how to build robots
    11·1 answer
  • Which is an example of a screenshot?
    7·2 answers
  • What command is used to generate an RSA key pair?
    9·1 answer
  • Which is considered to be the oldest form of social media? A. media-sharing sites B. location-based services C. social networkin
    5·1 answer
  • How much a T-mobile plan cost​
    11·2 answers
  • When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo
    11·2 answers
  • How do you close a file?
    12·2 answers
  • What is the age group for the silent genration
    10·1 answer
  • Cyber vulnerabilities to dod systems may include
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!