1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enyata [817]
3 years ago
6

Explain three ways of sharing and receiving information​

Computers and Technology
1 answer:
tino4ka555 [31]3 years ago
6 0
Face-To-Face Meetings

Face-to face information sharing is the safest and most efficient method of information sharing. In meetings, everyone can share their information and ask questions. This allows them to get the answers they need without having to wait. One problem with face-to-face information sharing is that sometimes it is not possible or economical to meet face-to-face. If you have to share information with someoen in California and you are in North Carolina, it is highly unlikely that your company will send you to California just for a face-to-face meeting. Telephones And Conference Calls

Calling individuals on the phone or having conference calls for larger groups of people are additional ways to share information. Like a face-to-face conversation, it gives everyone the opportunity to ask questions and get answers during the call. Another advantage is that people do not all have to be in the same building or location. This is cheaper for companies since it eliminates any travel time or travel costs associated with the information sharing. E-Mail

E-mail is another way to share information. The information can be placed in an e-mail and sent to multiple individuals or groups with a few clicks of a button. One problem with e-mail is security. It would be very easy to send important information to the wrong people. The use of e-mail also increases the response time to questions, because you have to wait until the other person calls you or sends you an e-mail response to your question.
You might be interested in
What is an enterprise system
Inessa [10]

Answer:

Explanation:

Enterprise system is a cross- functional information system that provides organization-wide coordination and integration of the key business processes. Enterprise system helps in planning the resources of an organization.

5 0
4 years ago
Read 2 more answers
We begin with a computer implemented in a single-cycle implementation. When the stages are split by functionality, the stages do
Anika [276]

Answer:

3.1 ns ; 1.25 ; 3.097

Explanation:

Given :

IF, 3 ns;

ID, 2.5 ns;

EX, 2 ns;

MEM, 3 ns;

WB, 1.5 ns.

Use 0.1 ns for the pipelineregisterdelay

maximum time required for MEM = 3 ns

Pipeline register delay = 0.1 ns.

Clock cycled time of the pipelined machine= maximum time required + delay

3ns+0.1 ns = 3.1 ns

2.) for stall after every 4 instruction :

CPI of new machine :

(1 + (1 /4)) = 1 + 0.25 = 1.25

3.)

The speedup of pipelined machine over the single-cycle machine is given by :

Average time per instruction of single cycle ÷ average time per instruction of pipelined

Clock time of original machine = 12ns

Ideal CP1 = 1

CPI of new machine = 1.25

Clock period = 3.1 ns

(12 * 1) / (1.25 * 3.1) = 12 / 3.875

= 3.097

D. Speed up will equal the number of stages in the machine

8 0
3 years ago
In the event you get pulled over for a traffic stop, describe the situation from the police officer's perspective and list at le
Zepler [3.9K]

Answer:

Dealing with traffic related issues

Explanation:

The police officer are primarily charged with the primary responsibilities of maintaining law and order in any given society.

from the police officer's perspective when I get pulled for a traffic stop it is expected that

  • as a first rule is to always be polite to the officer.  Greet the officer with a warm and friendly smile as this will lower his or her fears.
  • Always follow instructions and give the officer your license, registration and insurance information when they ask for it.  
  • Treat the officer with respect and courtesy.
  • Always remove your sunglasses and maintain eye contact with the officer.   Most law enforcement officials view this as a sign that you are being truthful.
  • Remain as inconspicuous as possible.   If the officer doesn’t remember certain aspects of the incident, this can work to your advantage in court.

The additional two (2) things you need to do make traffic stop go smoothly are:

1) Ensure you maintain a high sense of dutifulness in cause of performing your responsibility,

2) Ensure you put on a user friendly welcome to the road users this help to make them feel safe and secured.

5 0
3 years ago
Read 2 more answers
Which two components are configured via software in order for a PC to participate in a network environment
dalvyx [7]

Answer:

IP address and subnet mask.

Explanation:

The two components which are configured via software in order for a personal computer (PC) to participate in a network environment are;

I. IP address: it is an acronym for internet protocol address and can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are; Local (internal) IP address and Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are; Internet protocol version 4 (IPv4) and Internet protocol version 6 (IPv6). An example of an IPv4 address is 192.168.1.0.

II. Subnet mask: this is a logical segmentation or subdivision of an internet protocol (IP) network so as to accommodate more hosts (computer systems). An example of a subnet mask is 255.255.0.0.

6 0
3 years ago
Define the missing method. licenseNum is created as: (100000 * customID) licenseYear, where customID is a method parameter. Samp
g100num [7]

Answer:

I am writing the program in JAVA and C++

JAVA:

public int createLicenseNum(int customID){  //class that takes the customID as parameter and creates and returns the licenseNum

       licenseNum = (100000 * customID) + licenseYear;  //licenseNum creation formula

       return(licenseNum);     }

In C++ :

void DogLicense::CreateLicenseNum(int customID){ //class that takes the customID as parameter and creates the licenseNum

licenseNum = (100000 * customID) + licenseYear; } //licenseNum creation formula

Explanation:

createLicenseNum method takes customID as its parameter. The formula inside the function is:

licenseNum = (100000 * customID) + licenseYear;

This multiplies 100000 to the customID and adds the result to the licenseYear and assigns the result of this whole expression to licenseNum.

For example if the SetYear(2014) means the value of licenseYear is set to 2014 and CreateLicenseNum(777) this statement calls createLicenseNum method by passing 777 value as customID to this function. So this means licenseYear = 2014 and customID  = 777

When the CreateLicenseNum function is invoked it computes and returns the value of licenseNum as:

licenseNum = (100000 * customID) + licenseYear;

                     = (100000 * 777) + 2014

                     = 77700000 + 2014

licenseNum = 77702014                                                                                                        

So the output is:

Dog license: 77702014          

To call this function in JAVA:

public class CallDogLicense {

public static void main(String[] args) {//start of main() function

    DogLicense dog1 = new DogLicense();//create instance of Dog class

dog1.setYear(2014); // calls setYear passing 2014

dog1.createLicenseNum(777);// calls createLicenseNum passing 777 as customID value

System.out.println("Dog license: " + dog1.getLicenseNum()); //calls getLicenseNum to get the computed licenceNum value

return; } }

Both the programs along with the output are attached as a screenshot.

3 0
4 years ago
Read 2 more answers
Other questions:
  • To set up a slide show you should do all of the following except ______.
    9·1 answer
  • Computer maker Dell realized the problems with keeping large inventories, especially because of the fast rate of obsolescence of
    7·1 answer
  • Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
    11·1 answer
  • How does this app work?
    11·2 answers
  • Describe the best way to deal with a difficult co-worker?
    13·2 answers
  • What is an operating system?<br>​
    11·2 answers
  • What constructs break or bend the normal Syntax patterns of scheme?
    15·1 answer
  • Please answer me fast ​
    6·2 answers
  • My phone takes forever to load the ads, does anyone else have this problem? Is there a way to fix it? I’ve tried getting another
    12·2 answers
  • What type of malware is best known for carrying other malware as a payload?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!