1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kari74 [83]
3 years ago
15

HELP PLEase!!! Which option is an outcome of a project stated in quantifiable terms?

Computers and Technology
1 answer:
dimulka [17.4K]3 years ago
4 0

Answer: C) a 10 percent increase in efficiency of sales of a particular product line over one year

The term "quantifiable" means that we can attach a number to it. Specifically, a number in which we can do math operations upon it. Something like telephone numbers or serial numbers don't really count as quantifiable entities. They are qualitative variables instead. So you have to be careful what numbers you run into. In this case, "10 percent increase in efficiency" is quantitative and fits what we're after.

A 10% increase corresponds to the multiplier 1.10; for instance, if you had sales of 40 million dollars one year, then a 10% increase is 1.10*40 = 44 million in sales. This is one example where we apply a math operation (specifically multiplication) on the value in question.

You might be interested in
PLEASE HELP ILL GIVE BRAINLIEST
jeyben [28]

Answer:

text labels and different

Explanation:

4 0
3 years ago
The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the
mars1129 [50]

Answer:

I recommend Digital Certification of User through trusted certification Authority, who is requesting to access the company website through VPN to make sure the identity of the user.

Explanation:

Digital Certificate is the type of identity key or certificate that is assigned to the users as per their request. It is a unique number that is assigned to the user to ensure the authentication that Who are you. It is same like our identity card number that shows our identity to someone as per requirement.

These certificates are issued by certification organizations that are registered or trusted. If the users are using VPN on their devices to access some website that may not be a trusted user or a malware that can hurt the company by breaching the security protocols. So, some companies didn't allow untrusted users to websites.

<em>Therefore, I recommend to my company that, they should ensure that the users that are trying to access the website through VPN must have some digital Certificate from trusted certification authority to ensure the identity of the users.</em>

<em />

6 0
4 years ago
A section at The top of the page that makes it easy for a recipient to respond to a letter is called an
Vesna [10]

its a  return address

8 0
3 years ago
Read 2 more answers
The total nodal delay includes:
blondinia [14]

Answer:

all of the above

Explanation:

Total nodal delay is the sum of all types of delay.There are basically four types delay that are as following:-

  1. Processing Delay.
  2. Propagation Delay.
  3. Transmission Delay.
  4. Queuing Delay.

T(nodal)=T(processing)+T(propagation)+T(transmission)+T(queuing).

Where T is the delay time.We are given with propagation,transmission and processing.Nodal delay includes these 3 delays.

Hence we conclude that the answer is all of the above.

3 0
3 years ago
Read 2 more answers
according to the information-processing view of memory, the first stage in memory processing involves
ExtremeBDS [4]

Answer:The first stage of memory is encoding. In this stage, we process information in visual, acoustic, or semantic forms. This lays the groundwork for memory. The second stage is storing information so it can be recalled at a later point.

Explanation:sorry if its wrong

4 0
3 years ago
Other questions:
  • All of the following are stages in the SDLC except _____.
    9·1 answer
  • A customer has contacted you to help him alleviate the large amount of time and effort that goes into adding and removing users
    12·1 answer
  • Which file extension indicates that a file is an Adobe Acrobat document?
    13·1 answer
  • True or false? Main Content (MC) may include links on the page.
    6·1 answer
  • Why it’s important to keep the standard internet protocol TCP/IP?
    11·1 answer
  • Which of the following situations best illustrates the process of authentication?a.A Web site sets users' passwords to expire ev
    7·1 answer
  • 1. Write program, WriteData.java, that writes the following data to file books.txt. Include the semicolons. Fiction;Abraham Linc
    11·1 answer
  • An employee sets up an automation that transfers files in a specific folder on their PC to a remote drive for archiving, provide
    11·1 answer
  • An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this
    9·1 answer
  • What are the different types database of end users? Discuss the main activi-ties of each
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!