1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iVinArrow [24]
3 years ago
11

Emily loves her job as an executive recruiter for a large hospital located in Seattle, Washington. Part of Emily's job requires

her to gather industry information, collaborate with partners, compare competitors, and tap into the knowledge of prospective employees, partners, and customers. Which of the following would Emily use to perform her job?
A. interactivity metics
B. Source code
C. Network effect
D. Collective intelligence
Computers and Technology
1 answer:
Nana76 [90]3 years ago
3 0

Answer:

D. Collective intelligence

Explanation:

Collective intelligence appears when people work together. It is derived  from the collaboration, collective actions, and competition of many parties.

In Emily's job, she collaborate with partners, compare competitors and tap into the knowledge of prospective employees, partners, and customers. Thus, she performs collective intelligence.

You might be interested in
Write code that prints: usernum ... 2 1 blastoff! your code should contain a for loop. print a newline after each number and aft
Svetradugi [14.3K]

You never said what language so I used C

#include <stdio.h>

<span>int main () { </span>

<span>  int a;  </span>

<span>  for( a = 3; a > 0; a-- ){ </span>

<span>      printf("%i \n", a); }</span>

<span>  printf(" Blast OFF !!!\n");   </span>

<span>return 0; </span>

<span>}</span>

4 0
3 years ago
After a security incident is verified in a SOC, an incident responder reviews the incident but cannot identify the source of the
oksian1 [2.3K]

Answer:

Option A i.e., SME for further investigation.

Explanation:

Following the reports of such a security incident into an SOC, an incident respondent examines the incident but could not determine the cause of that same incident as well as establish an appropriate response protocol. The ticket for an incident must be applied to SME for even more inquiry. So, the following answer is correct.

5 0
3 years ago
A _____ can be destructive and can modify or delete files that may not be recoverable.
umka21 [38]
Virus

Hope this helps
6 0
3 years ago
When solving for K, when cell potential is known, what is one of the first steps to follow?
BaLLatris [955]
Yes it is D like the other person said
5 0
3 years ago
What level of system and network configuration is required for cui?
andrey2020 [161]

The level of system and network configuration is required for Cui will be "Moderate confidentiality".

  • The data that really should be safeguarded or disseminated under appropriate regulations, rules, and conservative government objectives or guidelines, would be considered as CUI.
  • The FISMA demands CUI Fundamental to somehow be safeguarded somewhere at the FISMA Conservative category and may even be labeled as CUI as well as regulated.

Thus the above answer is right.

Learn more:

brainly.com/question/14083709

4 0
2 years ago
Other questions:
  • Artists who draw images on a computer often use a stylus in conjunction with special _________ tablets, which offer extra-sensit
    15·1 answer
  • Consider the following method.
    13·1 answer
  • Mary is writing an article about the software development life cycle. She wants to place a flowchart besides the text. Which men
    6·2 answers
  • Write a program that uses for loops to perform the following steps: Prompt the user to input two integers: firstNum and secondNu
    15·1 answer
  • c++ You are given an array A representing heights of students. All the students are asked to stand in rows. The students arrive
    5·1 answer
  • You have just connected a new computer to your network. The network user static IP addressing. You find that the computer can co
    12·2 answers
  • Moving your Sprite from right to left is considered the X coordinate?
    5·1 answer
  • Question 5 (frue/False Worth 3 points)
    7·1 answer
  • simplify the expression below and state the value of m for which the simplified expression is not defined 2m² + m - 15/ m² - 9​
    5·1 answer
  • Write a method to add/subtract two matrices. The header of the method is as follows:
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!