1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
9

What is the name of the process that weighs the alternatives, gathers all necessary information, and can ultimately lead you to

the best choice in any given situation?
Computers and Technology
2 answers:
blondinia [14]3 years ago
8 0
This process is known as decision making.
Goshia [24]3 years ago
5 0

Decision making is the name of the process that weighs the alternatives, gathers all necessary information, and can ultimately lead you to the best choice in any given situation.

Decision making is the process in which best satisfying choices are made by identifying a decision, gathering important information, and examining alternative choices. The step by step approach of the decision making process is an efficient method that increases the chance that an individual will choose the best choice in any situation. The step by step approach are; (i) identify the decision, (ii) gather information, (iii) identify the alternatives, (iv) analyze the evidence, (v) choose the best alternatives (vi) implement the decision and (vii) review your decision and its effect

You might be interested in
What does the action tool allow you to do in Microsoft power point?
pickupchik [31]
I believe the answer is A. Add animation to clip art and text 
6 0
3 years ago
Raid level 6 is basically the same as RAID level 5, but it adds a second set of parity bits for added fault tolerance and allows
Leviafan [203]

Answer:

True

Explanation:

3 0
4 years ago
Select three nonrenewable types of energy.
trapecia [35]

Answer:

nuclear, coal,petroleum

6 0
3 years ago
Many documents use a specific format for a person's name. Write a program whose input is: firstName middleName lastName and whos
goblinko [34]

Answer:

The solution code is written in Python:

  1. name = input("Enter your name: ")
  2. name_components = name.split(" ")
  3. first_name = name_components[0]
  4. middle_name = name_components[1]
  5. last_name = name_components[2]
  6. print(last_name + ", " + first_name[0] + "." + middle_name[0])

Explanation:

Firstly, prompt user to enter name (Line 1).

Next, use the string <em>split()</em> method and use space " " as separator to split the input string into individual component, first name, middle name, last name and assign to variable <em>first_name, middle_name </em>and<em> last_name </em>(Line 5-7).

Display the output as required by the question.

6 0
3 years ago
A(n) __________ employs a method called "tunneling" in which each packet from the sending computer is encapsulated within anothe
Hitman42 [59]
<span>Virtual Private Network employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the internet.Tunneling protocol allows a network user to access or provide a network service that the underlying network does not support or provide directly</span>
7 0
3 years ago
Other questions:
  • A new protocol for new information distribution proposed by CERN became the world wide wed in 1991.
    10·1 answer
  • The total revenues for a company are $150,223 and the total expenses were 125,766. If you are calculating the net income, which
    10·1 answer
  • Create flowchart using Flowgorithm to represent the logic where the user inputs a number between 1 and 3 and displays the number
    7·1 answer
  • Many websites (mostly online shopping sites), monitor a person’s Internet browsing behavior, such as the websites we often visit
    14·1 answer
  • What is MS Paint ?<br>Computer <br>short answer​
    14·2 answers
  • Does trend in computing important for organization management?​
    8·1 answer
  • 2.3 Code Practice: Question 1
    5·1 answer
  • What action should you take if you become aware that sensitive compartmented information has been compromised
    14·1 answer
  • I need someone to help me paraphrase and make it in there own words? I struggle with this. This is the sentence
    10·1 answer
  • Sftp uses which mechanism to provide security for authentication and data transfer?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!