Answer:
recognizing that gender differences are a myth.
Explanation:
The options are:
- active listening.
- recognizing that gender differences are a myth.
- structured debate.
- building cross-cultural understanding
Without active listening, structured debate, and cross-cultural understanding group conflict are definitely on the card. However, no one now is concerned about gender differences. As now both the genders are already having the equal status in at least developed countries. However, this too can play a role in avoiding group conflict. However, since this is not that important considering the current context, this looks like being the correct option here. Hence, the above mentioned in the answer section is the correct option.
Hello, you haven't provided the programing language in which you need the code, I'll explain how to do it using Python, and you can follow the same logic to make a program in the programing language that you need.
Answer:
1. # -*- coding: utf-8 -*-
2. #Python
3. class Calculator:
4. def add(self):
5. print(a + b)
6. def sub(self):
7. print(a - b)
8. def mul(self):
9. print(a * b)
10. def div(self):
11. print(a / b)
12.
13. obj = Calculator()
14. choice = 1
15. while choice != 0:
16. a = int(input("\nEnter first number: "))
17. b = int(input("Enter first number: "))
18.
19. print("\n0. EXIT")
20. print("1. DIVISION")
21. print("2. ADDITION")
22. print("3. SUBTRACTION")
23. print("4. MULTIPLICATION")
24.
25. choice = int(input("\nEnter your choice: "))
26. if choice == 1:
27. obj.div()
28. elif choice == 2:
29. obj.add()
30. elif choice == 3:
31. obj.sub()
32. elif choice == 4:
33. obj.mul()
34. else:
35. break
Explanation:
- From lines 1 to 12 we define the object with four methods, addition, subtraction, multiplication, and division. Each method contains the operation between two variables inside a print function
- On line 13 we instantiate our class
- On line 14 we declare the variable choice that is going to store the operation that the user wants to perform
- On line 15 we declare a while loop, this is going to keep running the program until the user wants to exit
- From line 16 to 18 we ask the user to enter two numbers
- From line 19 to 24 we print the possible operation, assigning a number for each operation, this indicates to the user what number to press for what operation
- On line 25 we ask the user for the operation
- From lines 26 to 35 we check the user input an accordingly we call the corresponding method to performs the operation
Answer:
True
Explanation:
The advent of personal computing brought about by the implementation of several technologies including MOSFET, semiconductors, microchip and integrated circuits has revolutionized life in at a very high rate of change where traditional ways of doing things rapidly change and for the first time power was easily reachable by accessing a personal computer.
1. The computer personal computer brought about word processing, where there are very limited errors in individually printed documents and the time to produce a quality document was reduced
2. Email - With the advent of personal computers email, the information and communication time were lowered and it resulted in changes in commerce
3. Video conferencing - It was possible to have video conferencing with people and make decisions regarding direction can be made real time from very distant locations, which improved business reaction time
4. The mouse- The concept of having a graphic user interface improved computer interaction for people with limited programming skills.
Answer:
B. Use a new support manager permission sets
Explanation:
According to the requirements, field level security is required so, 1st options is not suitable because it may reduce the maintenance cost but increase the risk of security.
By creating a separate page for each of the two, it will leads to increase in the maintenance cost of the system. So <u>Option C</u> is also not suitable.
Option B is more Suitable as compared to others, that <em>Create a new support manager permission set</em>, with the help of this, both of Support rep and Support manager can visualize their required information with the help of support manager permission. This solution will not compromise the security and not increase the maintenance cost.