1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cestrela7 [59]
3 years ago
9

Decisions 1 and 3 are both ____________ decisions because ____________________.

Computers and Technology
1 answer:
Hoochie [10]3 years ago
5 0

The Question given is incomplete so from the internet the complete question is as follows:

Health Day Regional Medical center's management team has several decisions to make. They are attempting to sort out what to do first. The decisions are as follows:

1. Determine which patients to be admitted for the next day.

2. Decide weather or not to purchase the only other medical center in their          region.

3. Decide which candidates will meet the requirements for the nursing training program.

4. Determine weather the medical center should diversify into more advanced (and substantially more costly ) technologies.

Decisions 1 and 3 are both ____________ decisions because ____________________.

A. Programmed decisions; they are novel and complex

B. Non programmed decisions; they are novel and complex  

C. Programmed decisions; they are can be solved using rules and procedures

D. Non programmed decisions; they are novel and complex

E. None of the above is correct

Answer:

Option C is the correct answer.

Decisions 1 and 3 are both Programmed decisions because they can be solved using rules and procedures .

Explanation:

Programmed Decisions can be defined as the ones that are specified and developed for routine problems that are repetitive. These decisions deal with certainty.

Now from the given list of decisions, it is obvious that the decision 1 and 3 are programmed.

  • Patients that are to be admitted must undergo through the rules and regulations so that a decision may be taken.
  • Similarly in the case of nurses, proper testing must be conducted and candidates are selected upon this criteria.

<h2>I hope it will help you!</h2>

You might be interested in
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
avanturin [10]

Answer:

A. Spoofing

Explanation:

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.

Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take

7 0
3 years ago
In Microsoft Word, spelling errors are identified by a _____.
kvasek [131]
Red underline. Hope this helps.
5 0
3 years ago
Read 2 more answers
"the ____ criteria filter requires the records displayed to have the specified text string anywhere."
Debora [2.8K]

The contains criteria filter requires the records displayed to have the specified text string anywhere. Thecontains operator is used to perform case-sensitive matching regardless of location in strings.

The begins with criteria filter on the other hand requires the records displayed to start with the specified text string

3 0
3 years ago
What kind of output device would not be used to output images
saveliy_v [14]

Answer:

Speakers.

Explanation: Cause they only output sound, and are devices, further more they are not used to output images, like how could speakers output images using sound? They can't.

3 0
3 years ago
What level of system and network configuration is required for cui?
andrey2020 [161]

The level of system and network configuration is required for Cui will be "Moderate confidentiality".

  • The data that really should be safeguarded or disseminated under appropriate regulations, rules, and conservative government objectives or guidelines, would be considered as CUI.
  • The FISMA demands CUI Fundamental to somehow be safeguarded somewhere at the FISMA Conservative category and may even be labeled as CUI as well as regulated.

Thus the above answer is right.

Learn more:

brainly.com/question/14083709

4 0
2 years ago
Other questions:
  • ________ sets up a point-to-point connection between two computer systems over an Internet Protocol (IP) network. A. Point-to-Po
    15·1 answer
  • Turning up the transmit power or utilizing a high gain antenna to reach wireless users from a distance increases your exposure t
    12·1 answer
  • What is the cell reference for the cell located in the second column and fifth row of a worksheet?
    9·1 answer
  • How to create a distribution list in outlook?
    7·1 answer
  • When are bar charts most commonly used
    10·1 answer
  • Donna often travels around the world. When she travels, she needs to access her emails from different locations. However, to kee
    6·2 answers
  • How to format the selected range of cells as u.s currency
    6·1 answer
  • Qr code is more developed than barcode​
    11·1 answer
  • Which of the following statements about the relationship between hardware and software is true? a) Hardware can be present in in
    9·1 answer
  • Which of the following is not the disadvantage of closed
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!