1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Citrus2011 [14]
3 years ago
6

The type of power that has the ability to call on connections and networks both inside and outside the organization for support

in getting things done and in meeting one’s goals is known as ____________________.
a. association power
b. referent power
c. connection power
d. information power
e. coercive power
Computers and Technology
1 answer:
givi [52]3 years ago
5 0

Answer: c) Connection power

Explanation:

Connection power is the power that is established personally in the field of business.A person having connection with powerful person personally outside or inside the organizational field then he/she can attain the desired goals or result through connecting with them, influencing powerful person's decision, getting their things done etc .

  • Other options are incorrect because association power, information power,coercive power and referent power are the power to establish connection organization to achieved aim.
  • Thus, the correct option is option(c)
You might be interested in
Do you think computers are smart machines?​
LekaFEV [45]

Answer:

sort answer yes

Explanation:

computer are smart machines help us do good things helping humans communicate and help spread information that can help impact a work. Computers can even have more information than us which is really crazy even tho we created computers

idk if that helps

8 0
4 years ago
Decisions are individual and reflect the situations that are in your own personal life true or false
Nesterboy [21]
It is false because some decisions can effect other people as well
6 0
4 years ago
Read 2 more answers
Help me in this work sheet
andreyandreev [35.5K]

The correct matching of the given computer components/commands are:

  • Input- Data given to the computer
  • Output- Result provided by the CPU
  • Processing- CPU
  • Data storage- Memory

<h3>What is Input? </h3>

This refers to the process of giving raw data to a computer system that needs processing to be done to it.

Hence, we can see that based on the computer components and commands given in the image have all been correctly matched.

Read more about computer components here:

brainly.com/question/23339335

#SPJ1

4 0
2 years ago
What is the minimum number of locations a sequential search algorithm will have to examine when looking for a particular value i
Alecsey [184]

Answer:

O( n ) of the 100 element array, where "n" is the item location index.

Explanation:

From the meaning of the word "sequential", the definition of this algorithm should be defined. Sequential donotes a continuously increasing value or event, like numbers, increasing by one in an arithmetic progression.

A list in programming is a mutable data structure that holds data in indexed locations, which can be accessed linearly or randomly. To sequentially access a location in a list, the algorithm starts from the first item and searches to the required indexed location of the search, the big-O notation is O( n ), where n is the index location of the item searched.

4 0
3 years ago
To prevent deliberate contamination of food, a manager should know who is in the facility, monitor the security of products, kee
Alex_Xolod [135]

Answer:

Option D is the correct option.

Explanation:

In the above scenario, the manager wants to stop happening of contamination of the food that's why he wanted to know that who is the person that is responsible for the security of the following products. He also wants to know to whom he will inform for the food security and to whom he will communicate for that suspicious activity.

4 0
3 years ago
Other questions:
  • Consider the following program segment. ifstream inFile; //Line 1 int x, y; //Line 2 ... //Line 3 inFile &gt;&gt; x &gt;&gt; y;
    13·1 answer
  • You will use the _____
    15·2 answers
  • Security testing attempts to verify that protection mechanisms built into a system protect it from improper penetration.
    9·1 answer
  • In the ADT graph, the method addEdge has efficiency
    6·1 answer
  • How would a top margin be set
    7·1 answer
  • Describe business benefits of using wireless electricity?
    6·1 answer
  • Can you list the answers in order
    12·1 answer
  • In its entirety, the CCM process reduces the risk that ANY modifications made to a system result in a compromise to system or da
    14·1 answer
  • Given the following snippet of code, answer the following two questions based on the code: typedef enum {Sun, Mon, Tue, Wed, Thu
    15·1 answer
  • Match each item with a statement below.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!