The traditional role of a manager is that of a(n):<u> information processor.</u>
<u></u>
<h3>What is called as information processing?</h3>
information processing , the acquisition, recording, organization, retrieval, display, and dissemination of information. In recent years, the term has often been applied to computer-based operations specifically. information processing.
<h3>What is information processing in computer?</h3>
Information processing refers to the manipulation of digitized information by computers and other digital electronic equipment, known collectively as information technology (IT). Information processing systems include business software, operating systems, computers, networks and mainframes.
To learn more about Information processing , refer
brainly.com/question/6392847
#SPJ4
Answer:
b. LinkedHashSet
Explanation:
A LinkedHashSet is an ordered version of HashSet that maintains a doubly-linked List across all elements. When the iteration order is needed to be maintained this class is used. LinkedHashSet maintains a linked list of the entries in the set, in the order in which they were inserted.
Answer:
#include <stdio.h> // header file inclusion
int main() // main function declaration
{
int number,product=0; // variable declaration
while(product<100) // while loop
{
scanf("%d",&number); // input a number
product= number*10; // multiply the number by product
printf("%d\n",product); // print the value of product
}
return 0; // return statement
}
Output:
- If the user enter 10 then the loop terminates for the first time and the output is 100.
- If the user enter 5,10 then the loop executes in 2 times and the output is 50 and 100.
Explanation:
- Firstly there is an inclusion of header file which understands the meaning of printf() and scanf() function.
- Then there is the main() function definition
- Then we declare a two-variable (number and product) of integer type.
- Then we define a while loop and check the condition that product value is less than 100 or not.
- Then we take input and multiply by 10.
- Then we assign the value in the product and print the product value.
Answer: D.) Discretionary access control
Explanation: Access control modes provides networks with a security system used for moderating, risk prevention and privacy maintainance of data and computing systems. Several access control modes exists depending on the degree of control required. In the discretionary access control approach, users are afforded the freedom and flexibility of making choices regarding permissions granted to programs. Hence, in this mode, permission are user-defined and as such sets privileges based on how the user deems fit.
Computer-integrated manufacturing is the manufacturing approach of using computers to control the entire production process