1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
deff fn [24]
3 years ago
15

Before school, Kyle could not find his cell phone. Kyle tells his mom that he's already looked everywhere. Mom knows that Kyle s

ometimes looks at his phone in bed before falling asleep. She decides to look under his bed and finds the phone. What decision-making method did Kyle's mom most likely use?
Computers and Technology
1 answer:
inysia [295]3 years ago
7 0

Answer:

deductive decision-making strategy

Explanation:

In this scenario, it seems that Kyle's mom is most likely using a deductive decision-making strategy. This is when the individual goes through the process of reasoning from one or more statements (premises) in order to reach a logical conclusion. Which in this case Kyle's mom knew that Kyle sometimes sleeps with his phone next to him and that it there is space where it can fall. Using these two premises she deduced that the phone is most likely under the bed.

You might be interested in
Who would be a member of the American Dental Association?
ycow [4]

Answer:

a pratcing dentist

Explanation:

4 0
3 years ago
Which of these are examples of metadata for an audio file of a song recording?
alexandr1967 [171]

Answer:

B

Explanation:

The metadata is only the information in the background aka the info not directly given.

5 0
3 years ago
Read 2 more answers
What command is used to add a reflection or an outline to text
WARRIOR [948]

text effects, and typography.

6 0
3 years ago
Moving your Sprite top to bottom is moving along the X coordinate?
Marianna [84]
The answer is false
6 0
3 years ago
your computer is running exceptionally slow. not only does it take the operating system a long time to start, but programs also
aliina [53]

You would want to check for any programs running in the background, as well as run a virus scan.

8 0
2 years ago
Other questions:
  • PLEASE  HELPPPP!!!!!
    14·1 answer
  • ServletConfig defines a set of methods that a servlet uses tocommunicate with its servlet container.
    5·1 answer
  • A project manager is responsible for (check all that apply)
    13·1 answer
  • Assuming that we only support BEQ and ADD instructions, discuss how changes in the given latency of this resource affect the cyc
    7·1 answer
  • Application software can run without the presence of system software true or false ​
    5·1 answer
  • What was used to enhance silent films of the early 1900s
    15·1 answer
  • Which statement assigns the value 140 to the variable streetNumber in Python?
    13·1 answer
  • Functionality testing is primarily used with ____________. firewall protection software development hardening servers server tes
    8·1 answer
  • What are the difference among the whole note, half note and quarter note ? (this is music)
    12·2 answers
  • What is a port?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!