1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hodyreva [135]
4 years ago
15

There are many different types of decision-making. Which of the following is NOT a type of decision-making? a. fiat rule b. sing

le decision-maker c. majority rule d. consensus/collaboration
Computers and Technology
2 answers:
Murljashka [212]4 years ago
8 0

Answer:

These are all correct but if you want to get technical I would choose A, because fiat rule is used in the military without any consent from any political standpoint.

Explanation:

Korolek [52]4 years ago
5 0

Answer:

These are all correct but if you want to get technical I would choose A, because fiat rule is used in the military without any consent from any political standpoint.

Explanation:

You might be interested in
Imagine your friend wants to apply
mojhsa [17]
What do ur friend wants to apply for ?
7 0
4 years ago
What are some areas to fill out in the New Formatting Rule dialog box? Check all that apply. rule type function name condition c
spayn [35]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

In this question the given options are:

  1. rule type
  2. function name
  3. condition
  4. cell reference
  5. argument
  6. format

<u>The correct options to this question are:</u>

1. rule type  

3. condition

6.  format

These are the areas that can be used to fill out in the New Formatting Rule dialog box. Other options are not correct becuase these are not used to fill out new formatting rule dialog box.

6 0
3 years ago
Read 2 more answers
_______ computing refers to applications and services that run on a distributed network using virtualized resources.
denis23 [38]
D.cloud is my answer
7 0
4 years ago
Karen works in a department store. Her coworker gave diverse cultural backgrounds. Which statement shows that Karen understand t
Goshia [24]

Answer:

Karen!

Explanation:

hahhahahahhahaahhahahaahahha

she wouldn't understand anything

anyways, where is the statements THEN I'll edit my answer シ

5 0
3 years ago
You are the information security officer at a medium-sized company (1,500 employees). the cio asks you to explain why you believ
Ivahew [28]
If your CIO asks such a stupid question run for the hill, he should not hold that title.
Every company, small, medium or large should have Firewalls, Intrusion Detection, Managed Virus Protection Software at the very least. Windows is the most deployed OS in the world and of course the main target of hackers i.e Viruses. MAC's to a lesser extent and Unix while probably the least vulnerable are still not immune to Viruses/Trojan and other Malware.

Users can still be the victims of trojan horses, phishing scams, and other online fraud. There<span> is no such thing as a 100% safe computer, a </span>Mac<span>, Windows, and even Linux are all capable of being infected with a </span>virus<span> or other malware.
</span>
Lastly, physical access to any computer that is not encrypted is vulnerable.
5 0
3 years ago
Other questions:
  • What does the hexadecimal number 2D represent in the binary system?
    9·1 answer
  • When records are in ____ order, they are arranged one after another on the basis of the value in a particular field.?
    9·1 answer
  • Big data refers to huge collections of data that are difficult to process, analyze, and manage using conventional data tools. It
    13·1 answer
  • Comments should be written in what type of language
    6·1 answer
  • What are the five Ws?<br> (I don’t even know what this means)
    5·2 answers
  • Three materials needed to stream video video content
    10·2 answers
  • WHAT DO YOU KNOW?<br> Why would you want to change your Table<br> Properties?
    15·1 answer
  • When was the first computer made?
    8·1 answer
  • Viruses that load from usb drives left connected to computers when computers are turned on are known as.
    9·1 answer
  • Which device allows users to directly hear data from a computer
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!