1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
6

Your game design company has recently asked all employees to use a specific personal information management application (PIM) to

increase workplace efficiency. The PIM is collaborative, so contacts, calendar entries, and notes are shared across the team. Several team members are resistant to the idea, saying it interrupts their workflow, and they prefer their own way of handing contacts, notes, etc. Others don’t want their own notes to be seen by their coworkers.
Computers and Technology
1 answer:
saul85 [17]3 years ago
4 0

Answer:For example, an office worker might manage physical documents in a filing cabinet by placing them in folders organized alphabetically by project name, or might manage digital documents in folders in a hierarchical file system.

Explanation:

You might be interested in
Carlie was asked to review a software prject for her company and determine what materials are needed. Whihc part of project mana
Helga [31]

Answer:

The answer is "Resources".

Explanation:

All services should definitely be reviewed through Carlie. However many Software Developers, Reviewers, and others are accessible are important to find out. Only then can Carlie find out because needed, the exact timelines. Because whenever establishing precise deadlines, she needs to take a look at the tools, that's why the above given choice is correct.

8 0
3 years ago
Why are all the expert and tutor verified answers wrong???
posledela
They’re right, most of the time the question you ask can confuse them or you may say it incorrect etc.
3 0
2 years ago
Read 2 more answers
21. The most overlooked people in information security are:
yulyashka [42]

Answer: D. janitors and guards

Explanation:

Information security simply means the protection of information from an unauthorized use or access.

The most overlooked people in information security are the janitors and the guards. Due to the fact that they're at the bottom of the organizational chart, they tend to be overlooked and not given the respect that they deserve.

8 0
3 years ago
Create a Pet class that keeps track of the name, age, weight, type of animal, and breed for records at an animal clinic with 2 c
kati45 [8]

Answer:

class Pet():

   def __init__(self, name, age, weight, animal_type, breed):

       self.name = name

       self.age = age

       self.weight = weight

       slef.aT = animal_type

       self.breed = breed

   def set_name(self, name):

       self.name = name

   def get_name(self):

       return self.name

   def set_age(self, age):

       self.age = age

   def get_age(self):

       return self.age

   def set_weight(self, weight):

       self.weight = weight

   def get_weight(self):

       return self.weight

   def set_Type(self, type):

       self.aT = type

   def get_Type(self):

       return self.aT

   def set_breed(self, breed):

       self.breed = breed

   def get_breed(self):

       return self.breed

   def toString(self):

       print(f"The pet {self.name} is {self.age} year old and weighs {self.weight}lbs. The pet is a {self.breed} breed of {self.aT}.")

Explanation:

The python program defines a class called Pet that has five features namely name, age, weight, animal_type, and breed of the animal. The set and get methods of the class are the mutators and accessor respectively. The final method of the class is the 'toString' method that prints the summary of the Pet object instance.

4 0
3 years ago
SQL allows the use of special operators in conjunction with the WHERE clause. A special operator used to check whether an attrib
ycow [4]

Answer:

LIKE.

Explanation:

A structured query language (SQL) can be defined as a domain-specific language designed and developed for managing the various data saved in a relational or structured database.

In Computer programming, any word restricted for use, only in object names because they belong to the SQL programming language are called reserved word.

Hence, these reserved words can only be used as the name of an object but not as an identifier e.g the name of a function, label or variable.

Some examples of reserved words in structured query language (SQL) are UPDATE, GROUP, CURRENT_USER, CURRENT_DATE, CREATE, DELETE etc.

Hence, SQL allows the use of special operators in conjunction with the WHERE clause. A special operator used to check whether an attribute value matches a value contained within a subset of listed values is LIKE.

4 0
3 years ago
Other questions:
  • ______ refers to the physical or logical arrangement of a network.
    9·1 answer
  • Which of the following is designed to help an organization continue to operate during and after a disruption?
    12·1 answer
  • For each of these statements find a domain for which the statement is true and a domain for which the statement is false. a) Eve
    13·1 answer
  • The process of a web server adding a tcp header to a web page, followed by adding an ip header, and then a data link header and
    14·1 answer
  • A technician has a client’s laptop that is randomly shutting down. Which of the following is the FIRST step of the troubleshooti
    10·1 answer
  • Persuasion is when Someone speaks to crowd about love <br>○True<br>○False​
    10·1 answer
  • 1. Light of wavelength 900x10-9 m is emitted by a source. What is its frequency?​
    5·1 answer
  • Find different between manocots and dicots clarify with example​
    14·1 answer
  • What is the extension of a Microsoft access database 2013​
    7·2 answers
  • What Is What is the difference between system software and application software?<br>​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!