1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
2 years ago
15

Jane Estroisch works as a manager in a multidomestic firm. She focuses on the long-term questions facing the organization such a

s which countries to compete in and what organizational policies to follow. Jane is in the ________ level of the organization.A) operationalB) tacticalC) executiveD) functionalE) managerial
Computers and Technology
1 answer:
navik [9.2K]2 years ago
3 0

Answer:

b

Explanation:

Tactical. Perhaps she needs yo keep in touch with the board of directors in order to make an strategic planning.

You might be interested in
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption
Darya [45]

Answer:

Hardware security module.

Explanation:

Hardware security module is a Physical digital device that comes as a plug-in adapter used to secure and manage digital keys and provides crypto processing for strong authentication.

It has an onboard cryptographic keyboard and one or more crypto processors, and can be used on computers and network servers to prevent logical or physical authentication access to unauthorized users. It supports symmetric and asymmetric cryptography.

8 0
3 years ago
URGENT!
lutik1710 [3]

<u>Explanation:</u>

Hey there! you need not to panic about it ,your program didn't have Driver program i.e main program! the correct & working code is given below:

// C++ program to count  even digits  in a given number .

#include <iostream>  

using namespace std;  

// Function to count digits

int countEven(int n)  

{  

int even_count = 0;    

while (n > 0)  

{  

 int rem = n % 10;  

 if (rem % 2 == 0)  

  even_count++;  

 n = n / 10;  

}  

cout << "Even count : "

 << even_count;  

if (even_count % 2 == 0 )  

 return 1;  

else

 return 0;  

}  

// Driver Code  

int main()  

{  

int n;  

std::cin >>n;

int t = countEven(n);  

return 0;  

}  

6 0
2 years ago
What is workflow? how do you create your own workflow?
lana66690 [7]
A workflow consists of an orchestrated and repeatable pattern of business activity enabled by the systematic organization of resources into processes that transform materials, provide services, or process information.


Create a detailed outline of what you want to achieve and sketch a workflow diagram before using workflow chart software or templates. This will help to ensure your chart is accurate and complete. Always consider your process and workflow manageability when inserting logic in your workflow chart. You can use decision symbols, connectors and text boxes. Always confirm the accuracy of your workflow chart with other stakeholders.


(If you need to know what the workflow diagrams layout is just look it up. GL.)
6 0
3 years ago
The state licensing bureau recently conducted a survey at Community Hospital. During this review, the surveyors determined that
marshall27 [118]

Answer: Opportunity for Improvement

Explanation:

Any healthcare organization, service, or process that does not reach the established standard or the customer's expectations, is an opportunity for improvement. Furthermore, the Improving Medicare Post-Acute Care Transformation Act (IMPACT) established a quality reporting program aimed to find those opportunities for improvement. Once the problem has been established, is prudent to place an action plan to achieve the desired performance improvement aim.

3 0
3 years ago
Which of the following will track every single connection outside the Web by IP address and URL? Clipper Chip National Security
astraxan [27]

The answer is proxy server

A proxy server acts as an immediate or a gateway between you, the proxy client (example, the browser) and the internet or the destination website that you want to visit. Proxy servers are designed to re-route traffic and obscure source and destination. For instance, if you want to request a page like brainly, a proxy server will be able to retrieve this page for you by providing only its IP address to the site and act as a mediator between clients and the requested server. This however, does not mean that there is no link between you and this website. It means that all the information along with the requests you made will be collected by the proxy server.

4 0
2 years ago
Read 2 more answers
Other questions:
  • You want to register the domain name ABCcompany.org, but the registration service is not allowing you to do that. What's the mos
    10·1 answer
  • Mark had been a resident of Larchmont for 17 years, and local folks thought of him as a solid citizen. "In this sentence, the wo
    7·2 answers
  • Write statementsto show how finding the length of a character array char [ ] differs from finding the length of a String object
    9·1 answer
  • Look at the slide. How could the slide best be improved? By reducing the number of visual aids by increasing the font size by da
    8·2 answers
  • In which scenario would instant messaging be more useful than other forms of communication?
    10·1 answer
  • Natural selection is a. how systems of rewards increase desired behaviors. b. the idea that the observable environment affects b
    6·1 answer
  • What lets you do many things, like write book reports and stories?
    15·1 answer
  • Software on your computer is taking a long time to load. What could help solve this problem?
    5·1 answer
  • GIVING BRAINLIST TO WHOEVER ANSWERS
    9·1 answer
  • Factoring of integers. Write a python program that asks the user for an integer and then prints out all its factors. For example
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!