1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
4 years ago
5

Jim, the IT director, is able to complete IT management task very well but is usually two weeks late in submitting results compa

red to other department directors. He is _____. Not effective nor efficient Effective and efficient Effective but not efficient Efficient but not effective.
Computers and Technology
1 answer:
oee [108]4 years ago
5 0

Answer:Effective but not efficient

Explanation:

Jim is effective because he was able to complete the IT tasks well but he is not efficient because he didn't submit the result on time because being efficient includes management of time.

You might be interested in
Order the numbers (1.1)2, (1.4)10, and (1.5)16 from smallest to largest
Oksana_A [137]

Answer:

there are in order bru

Explanation:

g3jxndjzbsksieusisis

4 0
2 years ago
How many invalid code sequences can we have in 5b/6b encoding?
mart [117]
<span>In the process of 5B/6B encoding, it is possible to have the following two kinds of data sequences: 1. 25=32 data sequences 2. 26=64 data sequences Therefore, this can left us with some unused code sequences that are 32 in number (=26 – 25). On the other hand, in the encoding process of 3B/4B, it is possible to another set of data sequences as follows: 1. 23=8 data sequences 2. 24=16 data sequences This type of encoding also leaves us with some unused code sequences that are 8 in number (=23-24). 2. </span>
6 0
3 years ago
A teacher uses the spreadsheet below to determine the average quiz score of each student. The teacher inserts this information i
Vinvika [58]

need help!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

6 0
4 years ago
Read 2 more answers
Print person1's kids, call the incNumKids() method, and print again, outputting text as below. End each line with a newline.
Brilliant_brown [7]

Answer:

Explanation:

The following code was written in Java and modifies the code so that for the given input such as 3 it outputs the exact information shown in the sample output.

import java.util.Scanner;

class CallPersonInfo {

   public static void main(String [] args) {

       Scanner scnr = new Scanner(System.in);

       PersonInfo person1 = new PersonInfo();

       int personsKid;

       System.out.println("How many kids do you have:");

       personsKid = scnr.nextInt();

       person1.setNumKids(personsKid);

       /* Your solution goes here */

       System.out.println("Kids: " + person1.getNumKids());

       person1.incNumKids();

       System.out.println("New Baby, kids now: " + person1.getNumKids());

   }

}

class PersonInfo {

   private int numKids;

   public void setNumKids(int setPersonsKids) {

       numKids = setPersonsKids;

   }

   public void incNumKids() {

       numKids = numKids + 1;

   }

   public int getNumKids() {

       return numKids;

   }

}

4 0
3 years ago
6. What is the correct way to write 340,000,000 in scientific notation? (1 point
givi [52]

Answer:3.4X10^8

Explanation:

4 0
3 years ago
Other questions:
  • What is one strengths of line graph? a) Line graphs show percentage in a whole b) Line graphs show change over time c) Line grap
    13·2 answers
  • Which of the following statements is true of dpi?
    10·1 answer
  • Write a function index(elem, seq) that takes as inputs an element elem and a sequence seq and returns the index of the first occ
    7·1 answer
  • Janice usually works on a particular workbook. She decides to keep a backup of all the data in a separate workbook. She opens a
    6·2 answers
  • A general rule for printing is to use _____ fonts for headlines and serif fonts for body text
    6·1 answer
  • 5. How many subnets are possible in a network with a /19 CIDR?
    5·1 answer
  • POINT AND BRAINLIEIST GIVE AWAY!!!
    11·2 answers
  • Convert one billion byte into one storage unit​
    6·1 answer
  • QUESTION 1
    15·1 answer
  • Which type of SQL Injection allows an attacker to try to alter the SQL statement such that it always returns TRUE (authenticatio
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!