1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksley [76]
2 years ago
11

Jaden needs to implement a telecommunications technology that would most improve the way members of his team exchange informatio

n. He will use the decision-making strategy to help him. First, he must _____.
analyze choices
determine the goals
gather data
make the decision
Please help me and quick taking a test!
Computers and Technology
1 answer:
Verdich [7]2 years ago
3 0
<span>The fact that Jaden uses decision-making strategy means that he</span><span><span> will make his decision based on long-term goals and a longer term vision.</span> In order to implement a telecommunication technology that would most improve the way members of his team exchange information, Jaden first must determine the goals. </span>

You might be interested in
Is it true that if the user log out the computer will turn off automatically​
sergiy2304 [10]
Yes that is a true statement
8 0
2 years ago
Read 2 more answers
Why is peer answer always not working? just wondering idk why
Nady [450]
Wait.....What do you mean?
5 0
3 years ago
Read 2 more answers
Explain how can you protect your computer from malware
rosijanka [135]
Trend micro security for your Mac or pc or trend micro mobil security for your android or iOS Mobil device?

Hope this helps!
6 0
3 years ago
Read 2 more answers
Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
tiny-mole [99]

Answer:

a. social engineering attack

Explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.

6 0
3 years ago
Assume you have written a method with the header num mymethod(string name, string code). the method's type is
azamat
I need answer choices
5 0
3 years ago
Other questions:
  • Which is a feature of a strong thesis statement? A) It presents only the facts. B) It is open-ended. C) It answers the central q
    15·1 answer
  • Discuss advantages and disadvantages of Twisted Pair?
    6·1 answer
  • Select the correct answer.
    13·1 answer
  • What is the Role of an algorithm?
    11·1 answer
  • What is the BCC feature used for?
    12·2 answers
  • Se numeşte permutare a unei mulţimi finite orice rearanjare a tuturor elementelor acelei mulţimi.
    14·1 answer
  • 1 punto
    11·1 answer
  • Which is an example of an operating system? (5 points)
    5·1 answer
  • Checking for and correcting errors may need to be done numerous during which of the following phases of the software development
    7·1 answer
  • Your network uses a network address of 137. 65. 0. 0 with a subnet mask of 255. 255. 0. 0. How many ip addresses are available t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!