A thank-you note with a business
card enclosed or an e-mail saying how glad you were to meet someone are
examples of contact follow - up. It is another way of
saying that the person is interested to the giver of contact.
Answer:
A. flowcharts
Explanation:
Flowcharts are used to graphically describes a process or system. They can simulate the whole process step by step showing arrows between different steps.
Answer:
People
Explanation:
Information security management provides a description of the controls needed by an organization in order to ensure that it is capable of protecting the integrity, availability, and confidentiality of assets from security vulnerability and threats. On the other hand, the SETA program is three phased and ensures that organizations address and implement training and techniques for information security. Hence the only function that encompasses security personnel as well as aspects of the SETA program is the People function.
Answer: Cell phones use radio waves to communicate
Explanation:
Radio waves carry the information and travel in air at the speed of light. Cell phones transmit radio waves in all directions.
A. 8 (floor division)
b. 14 (PEMDAS)
c. 4 (Remainder of division)
d. -2 (PEMDAS - Modulus comes before subtraction )
e. 4.5 (floating point division)
f. 25.5 (PEMDAS- Division comes first here)
I didn't understand the last question. I hope you look all of this up if you plan on getting good grades.
PEMDAS is also sometimes taught as BODMAS in some schools.