1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
3 years ago
13

What are the disadvantages of using grid analysis to help make decisions?

Computers and Technology
2 answers:
alekssr [168]3 years ago
7 0

Answer:

Grid analysis is best used when a decision needs to consider multiple outcomes and different criteria. The format of this method however, can provide bias to a certain outcome. The process is only as good as the quality of information placed within the grid including the scoring. Once a factor is graded or placed subjectively, objectivity is compromised in this method. Also, this method keeps decision making strictly in a rational manner. But, it is considered unhealthy to be linear in decision making and one-sided. It is best to base decisions from a rational and take emotions into account as well.

Juli2301 [7.4K]3 years ago
6 0

Answer:

Grid analysis is best used when a decision needs to consider multiple outcomes and different criteria. The format of this method however, can provide bias to a certain outcome. The process is only as good as the quality of information placed within the grid including the scoring. Once a factor is graded or placed subjectively, objectivity is compromised in this method. Also, this method keeps decision making strictly in a rational manner. But, it is considered unhealthy to be linear in decision making and one-sided. It is best to base decisions from a rational and take emotions into account as well.

Explanation:

You might be interested in
Steps to copy and paste text/information from website to Ms-word using keyboard​
Greeley [361]

Answer: Highlight the text you want to copy. Use the shortcut key combination Ctrl + C on a PC or Command + C on a Mac to copy the text. Move the text cursor to where you want to paste the text. Press Ctrl + V on a PC or Command + V on a Mac to paste the text

Explanation:

just copy and past by highlighting the text you want and clicking ctrl and c at the same time then ctrl and v to put it on word

8 0
2 years ago
When writing HTML code, what is meant by 'syntax'?​
aleksandrvk [35]

Answer:

   Syntax is essentially the punctuation and grammar rules for a computer language.

Explanation:

  Certain characters and words have special meanings and must appear in a particular order for the computer code to make any sense. A simple example from line 3 in Figure 2.2 is the piece of HTML code <head>.

8 0
3 years ago
1. Data in a smart card can be erased
Ostrovityanka [42]

Answer:

false

true

false

true

true

5 0
3 years ago
Read 2 more answers
Jan pays $70 each month for her auto insurance policy. this regular payment is called a: co-pay, deductible, premium, claim?
balu736 [363]
Co-pay: Term often used in health care, insurance covers part of the cost and you pay the rest. Seeing in this situation you are paying for the insurance itself, the term is not correct. 

Deductible: An insurance term for when you have to pay a certain amount before insurance will cover the rest. 

Premium: A fee payed by the insured (Jan) to be covered. This is my best guess for your answer.

Claim: A claim is when Jan would request the insurance company to reimburse her after a car accident (or her tires got slashed, etc.)
3 0
3 years ago
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound
defon

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

4 0
3 years ago
Other questions:
  • When using an online media source, students should ensure the information is
    13·2 answers
  • 1) what are two functions of a pick or count condition?
    5·1 answer
  • Is a plotter input output or both
    10·1 answer
  • __________ is a protocol used by e-mail clients to download e-mails to your computer.
    14·1 answer
  • Jonathan works with a team of graphic designers. They have a collection of images and have divided the image editing work among
    5·2 answers
  • How do you award a brainliest
    8·2 answers
  • A SOCCER club uses ICT to
    10·1 answer
  • 01110101<br> +00100100<br> 00010001
    8·1 answer
  • HELP FAST PLEASE
    6·1 answer
  • 1.Microsoft Word is a/an ........​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!