1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
podryga [215]
3 years ago
8

Risk taker positive or negative​

Computers and Technology
1 answer:
ratelena [41]3 years ago
7 0

Explanation:

I think risk taker are <em>positive</em><em>.</em>

You might be interested in
If you are asked to design an optimal workflow using technology for a car accident claim process, what factors would you conside
yan [13]

Answer:

The factors to consider when building a solution for optical workflow for car accident are the type of claim to be modelled, also to examine the level of automation in vehicles.

Some of the software solutions that meet the requirements are the A1 Tracker  which is very effective to the enterprise business and small business working with insurance. we also have the Mutual expert, Ninja Quote.

Explanation:

Solution

In suggesting an optical workflow for the car accident claim process it is of importance to understand the following factors such as, the type of claim to be modelled, it will be determined by the policy that the clients have for their cars. this will assist in classifying the workflow and giving a clear path of the design.

The number of expected claims is also a very important factor that should be added in the design. Another important factor to examine  the level of automation of the vehicles, this can be very useful in collecting the accident data in a more efficient way and also making it simple to design the model.

Presently there are several workflow softwares in the insurance that have encouraged a great deal and have made the workflow in the insurance companies more greater.

Some of the soft wares are the A1 Tracker  which are very effective and efficient in are highly applicable to the enterprise business and small business working with insurance, the software is convenient in monitoring the work progress in the company.

The other soft wares that have been quite useful in the industry for example the Insly, ISI enterprise, Mutual expert, Ninja Quoter among others. These software are some of the best soft wares available in the market that have met the workflow requirement in the insurance sector.

7 0
3 years ago
Which of the following may businesses use to screen out applicants for a position? A. social media B. applications C. resumes D.
Nataly_w [17]
The correct answer is E
8 0
3 years ago
Read 2 more answers
Determine the output of the following code segment:
Nataly [62]

Answer:

The output to the given code as follows:

Output:

10

100

64

36

16

4

0

4

16

36

64

Explanation:

In the given java code, an integer variable "i" and an array number is defined, which size is 10, in the next step two for loop is declared, that can be described as follows:

  • In the first loop, array use loop variable "i" use, which minus the value of 5 and multiplies by 2, and it will calculate the square of that number.
  • In the next step, a for loop is declared, that prints these array number variable square.
7 0
4 years ago
Summarize the role of technology in efforts to explore space.
Georgia [21]
The role of technology in efforts to explore space could be argued to say that it has helped us to discover many different planets. An IS is a space station that helps us do stuff!!
6 0
3 years ago
Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward t
stepladder [879]

Answer:

Repeaters

Explanation:

As the question points out, the signal strength diminishes (attenuates) as it travels farther from the source.  Deploying a repeater at critical points throughout the building would boost the signal strength as it continues on its way.

5 0
2 years ago
Other questions:
  • When pasting information copied from a Word document into an Excel spreadsheet, click in the cell that will be the _______ of th
    7·2 answers
  • Which of the following situations best illustrates the process of authentication?a.A Web site sets users' passwords to expire ev
    7·1 answer
  • Assume a PHP document named hello.php has been saved in a folder named carla inside the htdocs folder on your computer. Which is
    11·1 answer
  • i set up an account and paid the yearly fee, now it's asking me to join. i've tried to log in and brainly isn't accepting my ema
    8·1 answer
  • Your team will write a function that reverses a C-string, to practice using pointers. You must use pointers and C-strings for th
    6·1 answer
  • Who is credited with writing Google's famous page ranking search algorithm?
    13·1 answer
  • mary has access to certain resources because she is in the Research division of her company. She has access to other resources b
    15·1 answer
  • AfcAAgrwdsgsFsefvzsdfvbjhbdjbbjbjsdndVHFadbhZJBVdb
    10·2 answers
  • When using the Internet, do not give out your __________ without your parents' permission. (Select all that apply.)
    7·1 answer
  • Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!