1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
5

How does Taylorism (scientific management used to streamline mass production) resemble a bureaucracy? Select one: a. Routinizati

on is found in assembly line work as well as bureaucracy. b. Both assembly lines and bureaucracies depend on hierarchies. c. Specialization is a characteristic of both an assembly line and a bureaucracy. d. Assembly lines and bureaucracies require workers to assume a fixed role.
Computers and Technology
1 answer:
elena-14-01-66 [18.8K]3 years ago
7 0

Answer:

C

Explanation:

thank god i've studied for this !!! :)❤

You might be interested in
Select the correct answer.
Andru [333]

Answer:

OD Check for Internet issues

5 0
3 years ago
Ava is at her first job interview, and the interviewer asks her a difficult question she hasn't prepared to answer. What should
lidiya [134]

Answers: It's A. Or C. sorry that the best i got

Explanation:

7 0
3 years ago
Read 2 more answers
PLEASE ANSWER QUICK!.....I am trying to buy a computer so I can play Crysis 3 what are computers that are good for this high det
Ainat [17]

Answer:

Macbook air pro

Explanation:

4 0
3 years ago
Is the following statement true or false? The message you send, the message you intend to
ExtremeBDS [4]

Answer:

False

Explanation:

Communication between people consistently becomes misconstrued. Our intentions are not known until made very clear.

3 0
2 years ago
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
Thepotemich [5.8K]

Answer:

Option (A) is the right answer.

Explanation:

The following terms can be described as :

Phishing: Phishing can be described as the concept of stealing personal data i.e. credit card, bank account information, etc. of customers by sending fraud emails or by making fraud webpages on the name of a reputed company.

Tailgating: tailgating can be defined as the concept of getting entry with the authorized person in a restricted zone.

Baiting: baiting can be described as the term of stealing personal data by giving greed to customers by telling them fraud offers.

Quid pro quo: quid pro quo can be defined as the concept where the attacker takes the access of the system.  

According to the scenario, the most appropriate answer is option (A) because the company sends a wrong web address which is used by hackers to collect user's personal data which comes under phishing.

3 0
3 years ago
Other questions:
  • Write a Tip Calculator in code in VMware Fusion
    13·1 answer
  • Out of the following guidlines which should you use when writing a memo?
    10·2 answers
  • Question 1 :The most common business firewall technique is to use a firewall server in conjunction with:This task contains the r
    11·1 answer
  • Which wireless device connects multiple laptops, tablets, phones, and other mobile devices in a corporate environment?
    13·1 answer
  • TOPIC-PYTHON
    8·2 answers
  • What is the safest way to pay online​
    13·2 answers
  • if someone has become very attached to their mobile device and feels anxious if the cannot connect to the internet, what are the
    7·1 answer
  • Project: Digital Media and Business
    9·1 answer
  • IBC Question: You are writing a JavaScript program for Blue Yonder Airlines. The program stores various information about the ai
    13·1 answer
  • Who benefits the most from billing by the second for cloud resources, such as virtual machines?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!