1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
satela [25.4K]
3 years ago
10

Is the trust necessary to use an emerging technology platform? why?​

Computers and Technology
1 answer:
choli [55]3 years ago
5 0

Answer:

Emerging technologies can provide improved accuracy, better quality and cost efficiencies for businesses in every sector. They can enhance trust in the organization's operations and financial processes, which is crucial for sustainable success.

You might be interested in
What is the value stored at x, given the statements:
iren [92.7K]

Answer:

0.

Explanation:

Given

int x;

x=3/(int)(4.5+6.4)

Required

What is x?

The first line of the code segment declares x as integer. This means that, it will only hold non decimal numbers.

With the above explanation, options (a), (c) and (d) can not be true.

Solving further:

x=3/(int)(4.5+6.4)

The computer evaluates the denominator as:

x=3/(int)(10.9)

The denominator is then converted to an integer. So, we have:

x = 3/10;

3/10 = 0.3 but

Recall that: <em>x will only hold non decimal numbers.</em>

So:

x = 0;

5 0
3 years ago
Once a manual is written, it may change over time as procedures change. What's a recommended format for a manual to incorporate
zhenek [66]

Answer:

Print the manual in a loose leaf binder so even small changes can be replaced

Explanation:

Procedure  manual is the document that contains the business policies and strategies. These strategies can be changed time to time in the interest of company.

As these policies or procedures changes, it is necessary to communicate with all employees. To communicate this updated information to all employees it is necessary to print all that pages, where the changes have been made to replace them in the current manual. If we print whole manual it may increase the cost of printing. To reduce printing cost and wastage of pages only print those particular pages that have been changed. This will help to communicate to the existing employees as well  as to newly hired employees.

3 0
3 years ago
Before you create a pivot table, it is important to __.
Reptile [31]

Before you create a pivot table, it is important to <em><u>Create a database</u></em>.

Option: A

<u>Procedure to create Pivot Table: </u>

1. Select the cells and table in the sheet containing the data you want to use.

2. Go to the Insert tab and click the PivotTable command.

3. In the dialog box ‘Create PivotTable’ will appear. Choose your settings, then click OK. In our example, we will use Sheet1 as our source data and insert the PivotTable on a new worksheet.

4. The Field List and blank PivotTable will appear on a new worksheet.

5. Once you create a PivotTable, you have to decide which fields to add. Each field has a simple column header from the source data. In the PivotTable Field List, check the box for each field you want to add.  

6. The selected fields will be added to one of the four areas below the Field List. In our example, the Salesman field has been added to the Rows area, while the Order Amount has been added to the Values area. Alternatively, you can click, hold, and drag a field to the desired area.

7. The PivotTable values will calculate and summarize the selected fields. In our example, the PivotTable shows the amount sold by each salesman.

8 0
3 years ago
Read 2 more answers
Tools used in a particular career depend on the tasks performed. True or false
Aliun [14]
True so hopefully this will help
8 0
3 years ago
Read 2 more answers
What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
babymother [125]

Answer:

Brute-force attack

Explanation:

A Brute-force attack is an attack that uses repetitive attempts of trying different combinations of usernames and passwords to access a website or server, The attacker can even use bots to help with the attack. This is the first line of attack used by hackers to gain unauthorized access to any password-protected server or website.

6 0
3 years ago
Other questions:
  • Please identify three examples of how the United States is heteronormative
    12·1 answer
  • PP 11.1 – Write a program that creates an exception class called StringTooLongException, designed to be thrown when a string is
    14·1 answer
  • Which of the following is the core communications protocol for the internet? telnet ftp tcp/ip ssl
    11·1 answer
  • My duties included reviewing
    13·1 answer
  • A computer operating system software manufacturer invests its profits in creating newer versions of its operating system softwar
    7·1 answer
  • Effective nonverbal communication can cause tension.<br><br> True or False
    15·1 answer
  • I like to troll what about you
    10·1 answer
  • One way to use contiguous allocation of the disk and not suffer from holes is to compact the disk every time a file is removed.
    13·1 answer
  • Tyra is peer conferencing about her project with a friend. Tyra's friend provided feedback that Tyra does not agree with. What s
    6·1 answer
  • During an election year, why would a senator want to determine a mode?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!