1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hodyreva [135]
4 years ago
15

There are many different types of decision-making. Which of the following is NOT a type of decision-making? a. fiat rule b. sing

le decision-maker c. majority rule d. consensus/collaboration
Computers and Technology
2 answers:
Murljashka [212]4 years ago
8 0

Answer:

These are all correct but if you want to get technical I would choose A, because fiat rule is used in the military without any consent from any political standpoint.

Explanation:

Korolek [52]4 years ago
5 0

Answer:

These are all correct but if you want to get technical I would choose A, because fiat rule is used in the military without any consent from any political standpoint.

Explanation:

You might be interested in
The development of computer languages is classified into two categories .<br><br>true or false​
Vikki [24]

Answer:

False

Explanation:

Mark me as a brainliest

6 0
3 years ago
A computer application such as Microsoft Access that is used to store data and convert it into information is a ________________
lorasvet [3.4K]
All data is stored in table
5 0
4 years ago
Briefly explain the Island of information.
castortr0y [4]

Answer:

Whats that

Explanation:

3 0
3 years ago
​which type of cryptography provides the most security?
Doss [256]

Answer B: Asymmetric cryptography, because the receiver has its own decryption key and cannot create encrypted messages, because he doesn't have the encryption key.

About the other answers:

A: Private keys are always involved, there has to be some secret to do encryption, so this answer doesn't say very much.

C: Digital signatures can be used to verify/prove some data comes from some person (the signer) in an unaltered way. It is not about encryption, so is not about the security of your message. You use it in combination with encryption.

D: Like A, this doesn't say very much. Shared secret keys (symmetric keys) can be used for encryption, but they are less secure since the keys have to exist in more than one place (sender and receiver).



4 0
3 years ago
When using the red / yellow / green method to present status of a project, green can mean which of the following?
zepelin [54]
C - on track - good to go

8 0
3 years ago
Read 2 more answers
Other questions:
  • Write the interface (.h file) of a class GasTank containing: A data member named amount of type double. A data member named capa
    13·1 answer
  • What is the name of the feature that can be enabled on slower-speed WAN links to prevent a large data transfer from affecting th
    10·1 answer
  • Why do most programmers indent the conditionally executed statements in a decision structure?
    7·1 answer
  • To delete a record, tap or click the record selector for the record, and then press the ____ key(s).
    12·1 answer
  • QUESTION 56 Use the Windows ________ to check on a nonresponsive program. Backup utility Error-checking System Restore Task Mana
    6·1 answer
  • URGENT: I need to add a while loop in this program but I don't know-how. I am also having trouble neatening some lines of code.
    15·1 answer
  • LISTEN I NEED EVERY SINGLE BRAINLY USER TO RE POST THIS THERE IS A USER WHO JUST SAID THEY ARE GOING TO KILL THEMSELVES PLEASE C
    12·2 answers
  • The cost of a postsecondary education increases with the length of time involved in the program.
    10·1 answer
  • What is the output of the following C++ code? int list[5] = {0, 5, 10, 15, 20}; int j; for (j = 0; j &lt; 5; j++) cout &lt;&lt;
    11·1 answer
  • To find out what a database contains simply look at the ________ inside the database.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!