1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina CMI [18]
3 years ago
8

This form of analysis is an extension of what-if analysis and is the study of the impact on other variables when one variable is

changed repeatedly.
Select one:

a. Optimization analysis

b. What-then analysis

c. Sensitivity analysis

d. Goal-oriented analysis
Computers and Technology
1 answer:
Elenna [48]3 years ago
3 0

Answer: (C) Sensitivity analysis

Explanation:

 The sensitivity analysis is also known as simulation analysis or "What-if" analysis as, it is basically used for the outcome prediction of the decision making in various range of the given variable.

It is used by making a given arrangement of factors, an investigator can decide that how changing in a single variable influence the final result.

The sensitivity analysis is the process for investigation of how the vulnerability in the yield of a scientific model or framework can be isolated in the system.  

Theretofore, Option (C) is correct as all the other options does not involve in the study of variable and also others are not the extension of what-if analysis.

You might be interested in
Why it is important for everyday people to have access to credible online information?
Citrus2011 [14]

Answer:

so you know what is true

Explanation:

5 0
3 years ago
Read 2 more answers
How could the following line of code be shortened?
Alinara [238K]

Answer:

2

Explanation:

The second option is the only one that will work. The last would work but doesn't make the code any shorter.

8 0
2 years ago
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report
algol13

Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

<h3>Does Apple use the file based encryption?</h3>

It is said that iOS and iPad OS devices are known to often use a file encryption system known to be Data Protection.

Therefore,  Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

Hence option A is correct.

Learn more about encryption from

brainly.com/question/9979590

#SPJ1

3 0
2 years ago
Which is a method used to determine database requirement?
Ivahew [28]

Answer:

I think it would be A, good luck!

8 0
3 years ago
What is the main difference between EDBAC and EDNIAC......​
lawyer [7]

Answer:

EDVAC (Electronic Discrete Variable Automatic Computer) was the successor to ENIAC, was binary based, and used stored programs, and was also designed by Eckert and Mauchly, UNIVAC I (UNIVersal Automatic Computer I) was the first commercial computer. It was designed by the same two men who designed ENIAC and EDVAC.

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • How do you destroy data on hard drive?
    8·2 answers
  • This toolbar can be used to change the way the text in your presentation looks. Drawing
    5·2 answers
  • What is meaning of reboot
    7·2 answers
  • The while loop has two important parts: a condition that is tested and a statement or block of statements that is repeated as lo
    8·1 answer
  • If the physical memory size is doubled without changing any of its other parameters, the number of entries in the page table
    5·1 answer
  • Your boss is very skeptical about the idea of storing his files up in the cloud rather
    8·1 answer
  • What percentage of business are using social media today
    14·1 answer
  • Which of the following is not the disadvantage of closed
    7·2 answers
  • In this paper https://arxiv.org/pdf/2008.10150.pdf, I'm having a hard time understanding how the assignment in the picture is de
    10·2 answers
  • What are benefits of AI
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!