1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helen [10]
3 years ago
12

Susan is working with an IT company. She has been asked to make sure that all of the functions in the company are in place and p

erforming optimally. Which management function should Susan employ to do this?
Computers and Technology
1 answer:
MrMuchimi3 years ago
7 0

According to Henri Fayol, it can be said that there are five functions of management: planning, organizing, staffing, directing, and controlling. From the description in the question, it seems that Susan should employ the controlling management function – which is defined as ensuring that all the ongoing process are proceeding as planned.

It is clear that this definition is precisely what Susan needs to do to fulfill the request that she was given.

You might be interested in
Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender
Pavlova-9 [17]

Answer:

C. Spoofing.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.

Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.

4 0
3 years ago
Select all the correct answers.
inysia [295]

Answer:

Buyers can source products from anywhere in the world.

Your purchases are delivered to the location you specify.

Explanation:

E-commerce refers to the process of buying and selling goods and services through the internet or the virtual world. The economic and business transaction done through this process constitutes electronic commerce or e-commerce.

Two advantages for buyers are that the <u>buyer can source the goods and products from all over the world and also get them delivered at the location specified</u>. This allows for an easy and effortless transaction and also saves the buyer's time and energy. With things available at just a touch of an electronic screen, the buyer can get products from anywhere and get them delivered at his/ her doorstep or for that matter, anywhere he/she wished it delivered, with no extra effort from his side.

Thus, the correct answers are the third and fourth options.

4 0
2 years ago
Is the disk in the C: drive fixable or removable disk
katrin2010 [14]

Answer:

The disk is a removable disk.

8 0
3 years ago
Read 2 more answers
Which computer program did these companies use? fb, Microsoft, Google, LinkedIn​
Verdich [7]

Answer:most of the computer campanies use java script, phyton, c++ or c sharp .

Explanation:

5 0
3 years ago
What could be the reasons of Blue Screen of Death on Windows computers?
muminat

Answer:

The reasons for  Blue Screen Of Death are as following:-

  1. Faulty Memory.
  2. Power Supply Issue.
  3. Overheating of Components.
  4. Malfunctioning Hardwares.
  5. Poorly coded device drivers.
  6. Hardware runnign beyond it's capacity.
  7. Bugs in the Operating System Kernel.

These are the some of the reasons why the blue screen of death is caused.

6 0
3 years ago
Other questions:
  • A layer of control in each communicating device that provides functions such as flow control, error detection, and error control
    13·1 answer
  • What does the use of color and images on a blog refer to?
    10·2 answers
  • What is the difference between a rendering engine and a browser engine?
    5·2 answers
  • Which tag denotes the end of an element in HTML? A. / B. * C. &gt; D. ) E. _
    8·1 answer
  • True or false? A medical assistant can check for available exam rooms and providers using an electronic scheduling system.
    8·1 answer
  • Excel solver does not allow for the inclusion of greater than or equal to
    9·1 answer
  • In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyon
    10·1 answer
  • What method of thermal energy is at work when heat lamps are used to warm up baby chickens?
    11·2 answers
  • YASHARI earns $27,000 per year, is single, and lives in Wyoming. She has $7000 in Direct Subsidized loans and another $19,000 in
    9·1 answer
  • unlike the barcode-based tracking system, a radio frequency identification system offers a .
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!