1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kamila [148]
3 years ago
10

What is the management part of a dashboard?

Computers and Technology
1 answer:
Stolb23 [73]3 years ago
7 0

Answer:

 The management dashboard is the visual and display the KPI ( Key performance indicator) and metrics for monitoring the specific process and department.

It is basically used for checking whether the organization achieve or meet its specific goals not as per the requirement of the particular department in the organization.

The main part of the management dashboard is that it provide the visibility and alignment in the particular organization so that it meets according to the requirements of the organization. The basic requirement in the organization are:

  • Business user
  • Organization needs
  • Information technology (IT) needs

You might be interested in
Make the list of menu icon in MS Excel<br>​
valina [46]

●file

●home

●insert

●page layout

●formulas

●data

●review

●view

8 0
3 years ago
Consider the steps for debugging. First, you should
SCORPION-xisa [38]

Answer:

run the code to see where the error is

Explanation:

4 0
3 years ago
What are the primary IP addresses for DNS servers hosted on the x128bit, iskytap and cloudparadox domains
coldgirl [10]

Answer:

208.91. 197.27 and  50.225.

Explanation:

In the world of computers, the term "IP" stands for Internet Protocol. The IP address or the Internet Protocol address is defined as a numerical label that is provided to every device which is connected to any computer network for communication. It works as providing the location address of the device and also identifies the network interface.

The primary IP addresses for the DNS servers that is hosted on :

-- x128bit is 208.91. 197.27

-- iskytap is  208.91. 197.27

-- cloudparadox is 50.225.

8 0
3 years ago
How old am i <br> (Will give brainliest)
diamong [38]
You’re probably thirteen
4 0
3 years ago
5.14 Describe how the compare and swap() instruction can be used to provide mutual exclusion that satisfies the bounded-waiting
Naddik [55]

Answer:

Explained below

Explanation:

Compare and Swap(C&S) is simply an atomic operation whereby the compare and swap operations are automatically executed.

Now compare and Swap basically needs 3 arguments namely:

- 2 old values which we will label X and Y

- 1 new value which is written in X that we will call Z

Thus, we now have; C & S = {X, Y, Z}

To explain this well, let X be a variable where X has a value of 7.

Now, if a programmer gives a program me that X be multiplied by 2,then what C&S operation will do is;

I) Y = X where Y is a new variable.

II) Result = C&S(X, Y, X*7)

Variable X is global and this means that mere than one process and more than 1 thread can see the variable X.

Now, if a process named P1 wants multiply the variable X by 7 using C&S operation, it will first make a local copy of variable X (which in this case is now the new variable Y). After that it will atomically compare X & Y and if they are equal, it will replace X with 10X.

However, if they are not equal, P1 will re-read value of X into Y and carry of C&S instruction again.

8 0
3 years ago
Other questions:
  • The true or false questions.
    5·1 answer
  • What action makes RAM on your computer disappear?
    12·2 answers
  • When installing conduit for a mast service, what type of conduit should you use?
    9·2 answers
  • According to Holpp and Kelly's approaches to developing vision, the benchmarking approach is more internally focused, whereas th
    6·1 answer
  • Write a function swap that swaps the first and last elements of a list argument. Sample output with input: 'all,good,things,must
    10·2 answers
  • Making the data impossible to recover even by applying physical forensics methods is known as __________ of media.
    13·1 answer
  • When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. B
    10·1 answer
  • modified true or false analyze each statement then write technical the statement is true the statement is false underline the wo
    6·1 answer
  • 7.2 need help plzs 15 points
    13·1 answer
  • How can a search be narrowed to only search a particular website????
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!