1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bess [88]
3 years ago
7

The chain of command is an unbroken line of authority that extends from the top of the organization to the lowest echelon and cl

arifies who reports to whom. The principle of​ ________ helps preserve the concept of an unbroken line of authority.
Computers and Technology
1 answer:
Leto [7]3 years ago
8 0

Answer: Unity of command principle

Explanation:

 The chain of command is basically defined as the command which is unbroken line of the authority and extends the level of the organization from top to lowest level echelon. It basically clarifies the individual report.

The unit of command is the principle that helps to preserve the main concept of the line of authority in an organization.

Most of the organization finds very effective way of command. The unit of command basically help to preserve this chain of command authority and also preserve it from the various structural characteristic of matrix as it break the unit of command.

You might be interested in
Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not acces
Vadim26 [7]

Answer:

TPM(Trusted Platform Module) is the correct answer to the following question.

Explanation:

Because TPM is the computer chip which protects your system data and store all keys and access of data that is encrypted by these keys. So that's why TPM is that hardware component which is used to contain the encryption keys and that data is not accessible to any other person's whether your hard drive will be lost or stolen by anyone.

6 0
3 years ago
The field that uses technology to manipulate and use information to improve healthcare is known as:_______
Sergeu [11.5K]

Answer:

Health informatics

Explanation:

7 0
1 year ago
I get brainlist to whoever can help my computer is doing this and I have class and it’s not working and I got it wet yesterday b
liq [111]

Answer:

try putting a lot of rice on the screen.

Explanation:

if it got water in it that should help it.

3 0
2 years ago
Read 2 more answers
_________ is the most popular high-level Java API in Hadoop Ecosystem. Cascading Scalding Cascalog None of the options
pochemuha

Answer:

The answer is Cascading

8 0
2 years ago
What are the advantages of using a vpn?​
Fantom [35]

Answer:

Changing ip address to avoid ip ban. keeping your personal info safe while on public connections

Explanation:

Looked it up.

5 0
2 years ago
Other questions:
  • Stress results from _______. A. Outside stimulus b. Internal stimulus c. Outside calm d. Internal calm
    12·2 answers
  • Python: Write a program that generates 8 random scores (between 0 and 100), store them in an array,
    8·1 answer
  • write the program or pseudocode algorithm that computes the product and average of three integers and display the results​
    7·1 answer
  • Who has gotten a random file link from someone? What file does it contain?
    8·2 answers
  • Heres a meme<br><br>free pints as well, because why not.​
    10·2 answers
  • If I got a monitor and kept my garbage laptop could I play games on max graphics?
    13·1 answer
  • HURRY please!!!!
    13·1 answer
  • These days, a digital signature is just as legitimate and trusted as an old-fashioned John Hancock on paper.
    9·1 answer
  • What code would you use to create the login button?
    11·1 answer
  • I WILL MARK BRAINIEST FOR THIS!!!!!!
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!