1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gayaneshka [121]
3 years ago
9

How does coved-19 effect in how mangers make decisions?Please help I need a lot of words ​

Computers and Technology
1 answer:
Leya [2.2K]3 years ago
8 0

Answer:

the pandemic has caused many managers hard time as to where they might have to lower a pay check of fire someone and they don't get a good result out of that or their business go under

Explanation:

You might be interested in
Create a trigger that prevents anychange(insert, update, or delete)to the grade attribute of the takesrelation that would change
Alchen [17]

Answer:

The trigger code is given below

create trigger F1_Del

after delete on Friend

for each row

when exists (select * from Friend

where ID1 = Old.ID2 and ID2 = Old.ID1)

begin

delete from Friend

where (ID1 = Old.ID2 and ID2 = Old.ID1);

end

create trigger F1_Insert

after insert on Friend

for each row

when not exists (select * from Friend

where ID1 = New.ID2 and ID2 = New.ID1)

begin

insert into Friend values (New.ID2, New.ID1);

end

5 0
3 years ago
Those persons with little in the way of hacking skills that can access and use powerful hacking tools are called _______________
KIM [24]

Answer:

Script Kiddies or "Skiddies"

Explanation:

A script kiddie, or “Skiddie,” is someone who lacks programming knowledge and uses existing software to launch an attack. Often a script kiddie will use these programs without even knowing how they work or what they do. They begin playing with the various programs while searching for online tutorials. At first, they may be perceived as nothing more than an internet troll or noob, due to their lack of experience and quickness to brag and boast. Sometimes they will even resort to cyber stalking or bullying. However , this may simply be a cover for other more nefarious activity.

3 0
4 years ago
What would be a situation in which you could use an excel chart to present your data
Pavlova-9 [17]
Having to compare results on experiments or lab tests to each other.
5 0
4 years ago
Read 2 more answers
To locate all locations in a document with the word "employer" and replace it with "company," you should use the _____ function.
grandymaker [24]
That should be the replace function which performs word replacements in documents.
6 0
4 years ago
Data frames can be subset by a chosen value using ==.
balandron [24]

Using python knowledge and writing code importing pandas, it is possible to create a function that corresponds to what you want.

<h3>Writting in python:</h3>

<em>import pandas as pd</em>

<em>if __name__ == "__main__":</em>

<em>    df=pd.read_csv('mtcars.csv')</em>

<em>    cylinders=int(input())</em>

<em>    print(df[df.cyl==cylinders].shape)</em>

See more about python at brainly.com/question/18502436

#SPJ1

5 0
2 years ago
Other questions:
  • Why are open standards important in the data communications industry?
    5·1 answer
  • Which function in Spell Checker should Patrick use if he makes the same mistake frequently when typing emails?
    11·1 answer
  • Which four of the following hardware components are specifically used to enable networking and are not part of a stand-alone com
    13·2 answers
  • Why does dew form on grass overnight
    7·1 answer
  • If the floating-point number representation on a certain system has a sign bit, a 3-bit exponent, and a 4-bit significand. What
    8·1 answer
  • A non technical kind of cyber intrusion that relies heavily on human interaction and often involve tricking people into breaking
    5·1 answer
  • Select the variable that illustrates the ratio scale of measurement. (a) gender (b) weight (c) political party affiliation (c) r
    13·1 answer
  • Review the HTML tags that we have gone over in this lesson. Research HTML tags on the web and identify two new tags. Use these t
    9·1 answer
  • Identify the programming language released by
    10·1 answer
  • How is a technical certificate like a computer-related associate degree?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!