1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnom [1K]
3 years ago
8

_____ has many knowledge management applications, ranging from mapping knowledge flows and identifying knowledge gaps within org

anizations to helping establish collaborative networks. Select one: a. Social network analysis (SNA) b. Branching router-based multicast routing (BRM) c. Online analytical processing (OLAP) d. Drill-down analysis (DDA)
Computers and Technology
1 answer:
harkovskaia [24]3 years ago
5 0

Answer:

A. Social network analysis (SNA).

Explanation:

This is explained to be a process of quantitative and qualitative analysis of a social network. It measures and maps the flow of relationships and relationship changes between knowledge possessing entities. Simple and complex entities include websites, computers, animals, humans, groups, organizations and nations.

The SNA structure is made up of node entities, such as humans, and ties, such as relationships. The advent of modern thought and computing facilitated a gradual evolution of the social networking concept in the form of highly complex, graphical based networks with many types of nodes and ties. These networks are the key to procedures and initiatives involving problem solving, administration and operations.

You might be interested in
A group of computers that are interconnected in order to share information or documents is called what?
Rufina [12.5K]
It is a type of network . and the network's name is computer network
4 0
3 years ago
Please help me with this please and explain thanks
Luden [163]

Answer:

I think the first one us to create a link to a website

4 0
3 years ago
Which type of systems development is characterized by significantly speeding up the design phase and the generation of informati
nydimaria [60]

Answer:

Joint Application Development (JAD)

Explanation:

Joint Application Development is a method of application development that  lay emphasis on the up-front aspect of the application development cycle whereby steady communication between the designers and the intended users of the application under development by coming together in collaborative workshop styled discussions known as JAD sessions involving the mediators, facilitator, observers, end users, experts, and developers. As such with JAD process application development result in fewer errors high quality and is completed in lesser time.

3 0
3 years ago
A network administrator is configuring an ACL with the command access-list 10 permit 172.16.32.0 0.0.15.255. Which IPv4 address
lord [1]

Answer:

For this wild card mask 0.0.15.255 the ACE IP address will be 172.16.47.254

Explanation:

ACL is the access control list that is used to enlist the ip addresses that allowed or restricted to access the network. ACE is an IP address from the list ACL that has all rules and regulations related to access of network. The ACE could be in the range of IP address in ACL. ACL can be calculated with the help of initial IP address adding with wild card mask.

So

Initial IP address is = 172.16.32.0

Wild card mask =0.0.15.255

by adding above values we can find the last IP address of ACL.

after addition

Final IP address is = 172.16.47.255

The options that are available with question, Only option between the range is  172.16.47.254. So we can say that This is the only ACE IP address in options.

7 0
3 years ago
Which of the following "masters" can be eamed without attending a collery or universites
SashulF [63]

Answer:

costume design

Explanation:

Ez

3 0
3 years ago
Other questions:
  • PHOTOGRAPHY
    15·2 answers
  • Never mind I got it
    8·2 answers
  • What is the top folder of the file tree called
    5·2 answers
  • When gathering information, which of the following tasks might you need to
    13·1 answer
  • Please Help ASAP! 30 Points! Will Mark Brainliest! Please Don't Waste Answers! It's Due In 40 Minutes Please Help Me!
    12·1 answer
  • Workstation control standards institute security requirements to harden end user devices. For example, a Malicious Code Protecti
    10·1 answer
  • Gear systems with __________ can have both drive and driven gears on the same shaft. a. an odd number of gears b. an even number
    6·1 answer
  • a rule that states each foreign key value must match a primary key value in the other relation is called the
    5·1 answer
  • What is a narrative?
    7·2 answers
  • Decades of research throughout the world have found a _____ correlation between academic achievement and socioeconomic status, l
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!