1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeTakaya
4 years ago
10

_____ refers to the knowledge, tools, and methods used to transform inputs (raw materials, information, and so on) into outputs

(products and services).
Computers and Technology
2 answers:
iVinArrow [24]4 years ago
5 0

Answer:

General environment:

refers to the knowledge, tools, and methods used to transform inputs (raw materials, information, and so on) into outputs (products and services).

Explanation:

The general environment is a dimension that covers the whole context/universe of the existence of a certain element. In our case a company, or a business. It comprehends, social, cultural, technology, politics, and legal trends surrounding the company. Because in this case, we are considering the company as an object that interacts with a society and an environment in constant change. Because that is the nature of society, to change, to develop.

Zolol [24]4 years ago
3 0

Answer: operations management.

Explanation:

Operations management as a component of product building contains the knowledge, tools and methods for conversion of input into output. here the term input refers to raw materials, data, information and the output is in the form of finished products or services being rendered out.

Example the food prepared by a restaurant is use to provide catering service in an organisation is a form of operations management.

You might be interested in
Suppose an IP packet is fragmented into 10 fragments, each with a 1% (independent) probability of loss. To a reasonable approxim
Marysya12 [62]

Answer:

a. 0.01

b. 0.001

c. The identification field of the packet fragment can be used to uniquely identify and collate the fragments lost in transmission.

Explanation:

The probability of losing a packet is 10% or 0.1, so the probability of losing the packet twice during transmission;

= 0.1 x 0.1 = 0.01

When any fragments have been part of the transmission, the probability of the packet is dependent on the fragments;

= 0.01 x 0.1 = 0.001

The identification field is a unique 16-bit value assigned to an IPv4 packet, when a packet is fragmented for transmission, its field is used to collate the unique fragments in the packet.

6 0
3 years ago
Does anyone know how many Brainliests you need to be able to send a private message to someone??
White raven [17]

Answer:

no idea sorry...

Explanation:

8 0
3 years ago
Read 2 more answers
What is one of the main problems with shared web hosting? Select one: Sites that share resources are less susceptible to hacking
Pani-rosa [81]

Answer:

If one or more of the shared sites go down, then there is a good chance that your site will go down as well.

Explanation:

Shared web hosting is a form of web hosting service whereby more than one websites are placed on a single web server that connects to the internet.

Though it is cheaper, it has various problems. And over time, it has been concluded that the major problem associated with shared web hosting is the security issue.

This implies that "If one or more of the shared sites go down, then there is a good chance that your site will go down as well."

Some other problems associated with Shared web hosting are poor value, less flexibility, none advanced features, slow service, less support.

4 0
3 years ago
Have you ever been told sensitive or confidential information that made you uncomfortable? How did you deal with the situation?
Korvikt [17]
I would tell said individual to stop what they’re trying to tell me because if it’s not stuff I should know about or want to hear about then I don’t wanna hear any of it
7 0
3 years ago
Why is it difficult to detect a Trojan horse?
marishachu [46]

Answer:

Explanation:

Because the virus disguises it self as something you are trying to download, then it attackes your device

8 0
3 years ago
Read 2 more answers
Other questions:
  • When an object is selected, it is surrounded by ________, which allow you to change the size of the object.?
    5·1 answer
  • The procedure call mystery(38) will yield which output? __________ a) 0 12 b) 12 0 c) 1 1 0 2 d) 1 1 1 1 e) 2 0 1 1 public void
    11·1 answer
  • Buying an existing business
    7·1 answer
  • A 10-foot ladder must make an angle of 30° with the ground if it is to reach a certain window. What angle must a 20-foot ladder
    9·2 answers
  • What is the Most popular game out today?
    6·2 answers
  • What is the value of i printed? j = i = 1 i += j + j * 5 print("What is i?", i)
    11·1 answer
  • Why was the Internet first developed? Use details and information to explain your answer.
    6·1 answer
  • Characteristics of RAM​
    5·1 answer
  • What are 3 similarities and 3 differences between live theatre and film/videos -Drama Class
    13·1 answer
  • what is one category of software mentioned in the unit materials as being example of groupware English technical
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!