1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slava [35]
3 years ago
8

ProgrammingAssignment3

Computers and Technology
1 answer:
Paul [167]3 years ago
5 0

Answer:

Las actividades de planificación, seguimiento, evaluación y elaboración de

informes mencionadas se analizarán de manera más pormenorizada en las

próximas secciones. Sin embargo, el siguiente resumen brinda una síntesis de

estas actividades y en el anexo 2 figuran recursos adicionales para cada etapa.

1. Evaluación inicial de las necesidades: evaluación que tiene por objeto determi‑

nar la necesidad de llevar a cabo un proyecto o programa y, en caso afirmati‑

vo, brindar información a los responsables de la planificación.

2. Matriz de planificación e indicadores: componentes que abarcan el plan de

operaciones del proyecto o programa y sus objetivos, indicadores, medios de

verificación e hipótesis.

3. Planificación del seguimiento y la evaluación: el proceso mediante el cual se

planifica en forma práctica cómo se seguirán y evaluarán los objetivos y los

indicadores del marco lógico del proyecto o programa.

4. Estudio de referencia: estudio en virtud del cual se miden las condiciones ini‑

ciales, mediante los indicadores adecuados, antes del inicio de un proyecto o

programa.

5. Revisión o evaluación de mitad de período: principales actividades de reflexión

destinadas a evaluar la ejecución del proyecto o programa en curso y brindar

información a los responsables.

6. Evaluación definitiva: evaluación que se lleva a cabo una vez concluido el pro‑

yecto o programa con el objeto de determinar en qué medida se lograron los

objetivos previstos y qué cambios se produjeron.

7. Difusión y utilización de las enseñanzas extraídas: el proceso mediante el cual

se transmite información a los responsables de los proyectos y programas

en curso. No obstante, los procesos de elaboración de informes, reflexión y

extracción de enseñanzas deben llevarse a cabo durante la totalidad del ciclo

Explanation:

You might be interested in
from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing
Brums [2.3K]
From January 2005 through July 2017, approximately 853 million electronic data records in the US were breached.
This allowed the attackers to take control over people's personal data, such as their various credit card numbers, and other important data, as well as their addresses, etc. The cyber police, as well as the regular police have been working hard to stop this from happening, but the hackers are very strong and smart.
4 0
3 years ago
If you would like to compare information on two different Web pages, you should _____.
Gekata [30.6K]

Answer:

Use Tabs

Explanation:

I had this lesson on odyessy ware and this was right the other guy is wrong

4 0
2 years ago
Read 2 more answers
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
Write an expression that prints 'You must be rich!' if the variables young and famous are both True.
Rufina [12.5K]

Answer:

Following are the expression to this question:

if (young and famous==True):

Explanation:

For print, the given expression the code requires some modification that can be defined as follows:

young = True#defining a bool variable that holds a value True

famous = True#defining a bool variable that holds a value True

if (young and famous==True):#defining if block that check variable value

   print('You must be rich!')#print message

else:#else block  

   print('There is always the lottery...')#print message

Output:

You must be rich!

Code explanation:

In the above-given code, two variable "young and famous" is declared, that hold a "True" which is a bool value, in this code, a conditional statement has used, that checks variable value, which can be defined as follows:

  • In the if block, it uses the above declared variable with and gate to check its value is equal to true.
  • If the condition is true, it will print the true block message, otherwise, go to the else block in this, it will print the else block message.
4 0
2 years ago
What principle of interaction is John using?
Rainbow [258]

Answer:

but which john

Explanation:

man people don't make sense you more man

8 0
3 years ago
Read 2 more answers
Other questions:
  • The PATH environment variable.
    5·1 answer
  • What is the relation between Information and Data?
    6·1 answer
  • What is one of the benefits of using templates for your email marketing campaigns?
    10·1 answer
  • Write a program to calculate the area of a triangle whose base is 10cm and height is 6cm
    6·1 answer
  • A large amount of scatter in a scatterplot is a indication that the association between the two variables is
    13·2 answers
  • In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in
    9·1 answer
  • Select the correct answer..
    6·1 answer
  • What is the output of the following?
    7·1 answer
  • When James added a date field to a PivotTable, Excel grouped the date values into quarters, months, and years. He does not want
    13·1 answer
  • What are the value and data type (float, int, bool, or str) of this expression:<br> 5 // 2
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!