1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sineoko [7]
3 years ago
15

Check My Work _____ are made in response to situations that have occurred frequently enough to enable managers to develop decisi

on rules that can be applied in the future. a. Programmed decisions b. Nonprogrammed decisions c. Aberrant decisions d. Unique decisions
Computers and Technology
1 answer:
enot [183]3 years ago
8 0

Answer:

a. Programmed decisions

Explanation:

We basically have two types of decision:

  • Programmed decision
  • Non-Programmed decision

Programmed Decision: used for frequent situations of the organization; both internal and external. This decision results in the formulation of rules, procedures, and policies that can be applied in the future.

Non-Programmed Decision: used for unique and ill-structured situations of the organization; both internal and external. They are one-shot decisions. They have been handled by techniques such as judgment, intuition, and creativity.

You might be interested in
In many supermarkets customers can pay for their shopping using credit cards. (a) Name two items of information stored on the ma
slamgirl [31]

Answer:

Explanation:

Two items on the magnetic strip are, Credit Card info and Balance

Two ways supermarket may check are the PIN pad you are using to pay or their reciept system.

7 0
3 years ago
Yall tryna play gta later? I play on ps4
iVinArrow [24]

Answer:

xbox tho

Explanation:

8 0
2 years ago
Read 2 more answers
Certain files, such as the ____ and Security log in Windows, might lose essential network activity records if power is terminate
Hoochie [10]

Answer:

The answer to this question is a. Event log

Explanation:

Event log in Windows is a comprehensive record of security,system and application notifications stored by the Windows and it is used by administrators to determine problems in the system and foretell issues that going to happen in future.

Operating system and the Apps use event logs to keep account of important software and hardware activity that administrator can use to correct issues with the operating system.

7 0
3 years ago
What do mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud co
Anuta_ua [19.1K]

Answer:

4G/5G.

Explanation:

The broadband cellular network technology that mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud computing, high-definition mobile TV, and mobile 3-D TV is 4G/5G.

4G technology refers to the fourth generation broadband cellular network technology that is typically used for cellular communications on mobile phones and it is considered to have an internet speed that is ten times faster than what is obtainable on the third generation (3G) broadband technology.

Similarly, 5G is the fifth generation broadband cellular network technology that succeeded 4G and it offers higher quality in terms of performance, reliability, availability and efficiency.

As a result of the speed and high quality specifications of the 4G/5G broadband cellular network technology, they are widely used for various communications systems.

5 0
2 years ago
3.
Viktor [21]
3. <span>for the mother to stay home to tend to the household and care for the children while the father worked to support the family

4. true (not 100% sure)</span>
5 0
2 years ago
Other questions:
  • What are factors that limit a technological design
    13·1 answer
  • ​In addition to joint application development, another popular user-oriented method is _____, which resembles a condensed versio
    14·1 answer
  • To move up one paragraph, press the ____ key(s). f1 alt up arrow up arrow ctrl up arrow
    8·1 answer
  • Which attribute of the image tag specifies the URL of an image
    14·1 answer
  • Write SQL statements for the following: 1. 2. 3. Change the column Z of a table XYZ to now acceptdefault value 9999 Delete a tab
    8·1 answer
  • Yolanda first breaks down the whole game she needs to program into modules. She then breaks these modules into smaller modules u
    11·1 answer
  • Cuales son las paginas web​
    12·1 answer
  • Employers can use spyware to track program usage by employees.
    12·1 answer
  • What is computer topology​
    5·2 answers
  • Electronic evidence on computer storage media that is not visible to the average user is called​ ________.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!