1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hram777 [196]
3 years ago
7

Select the best answer from the drop-down menu.

Computers and Technology
2 answers:
Orlov [11]3 years ago
8 0

Answer:

1) R<u>easoning</u>

<u>2)Nonverbal</u>

<u>3)Generating solutions.</u>

<u>4)Decision making</u>.

<u>--------------------------------------</u>

Robert is reviewing complex information and data concerning a new product launch to determine the cause of some product failures. He is primarily using <u>reasoning</u> skills.

Reasoning through a problem requires an understanding between verbal and <u>nonverbal</u> ideas.

When you use reasoning skills and past experience to brainstorm ideas you are <u>generating solutions.</u>

When you narrow down solution ideas, then select the best one, you are engaging in <u>decision making</u>.

<u>OAmalOHopeO</u>

Gekata [30.6K]3 years ago
6 0

Answer:

Robert is reviewing complex information and data concerning a new product launch to determine the cause of some product failures. He is primarily using reasoning skills.

Reasoning through a problem requires an understanding between verbal and nonverbal ideas.

When you use reasoning skills and past experience to brainstorm ideas you are generating solutions.

When you narrow down solution ideas, then select the best one, you are engaging in decision making.

You might be interested in
19. WHICH KEY ALLOWS YOU TO DELETE AND TYPE OVER TEXTS? *
likoan [24]
The answer is Backspace
4 0
3 years ago
Read 2 more answers
1.Which one of the following buttons returns a window to its original size?
Ber [7]

Answer:

1. D

2.C

3. D

4. A

5. B

6.B

7.B or D

8.C

Explanation:

Not 100% sure about 3,4, 8

7 0
3 years ago
When a program is adapted to run on multiple processors in a multiprocessor system, the execution time on each processor is comp
____ [38]
I only need points for my questions
4 0
3 years ago
Which of the following best describes a hacktivist? Select one: a. An individual who attempts to destroy the infrastructure comp
brilliants [131]

Answer: (B) An individual who hacks computers or Web sites in an attempt to promote a political ideology

Explanation:

 Hacktivist is the defined as an individual that basically hacks the various types of web sites and computer system for promoting the various political ideologies. The hacktivists is the method which include the DDOS attacks (Distributed denial of services).

It basically causes various website and the email with the congestion of traffic with the computer virus and by the data stealing. The denial of services attacks typically considered federal crime and illegal in united state.  

4 0
4 years ago
Specify either "Write Through" or "Write Back" as the policy which best corresponds to each of the conditions below.
Mariulka [41]

Answer:

1. Write through

2. Write back

3. Write back

4. Write through.

Explanation:

The answers are given accordingly as above.

4 0
4 years ago
Other questions:
  • Which of the following are recommended techniques for protecting computer files and data? Check all of the boxes that apply.
    15·2 answers
  • If it is impractical to place guest users in a secure network, isolated from the production network by firewall barriers, then:
    14·1 answer
  • In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
    15·1 answer
  • Discuss two things you want to know about driving
    12·1 answer
  • 1. What runs horizontally and is identified with numbers?
    12·2 answers
  • When considering changing the content of a cell which button should you press to leave the cell as it originally was
    12·2 answers
  • Which of the following are provided by most professional organizations
    11·1 answer
  • Where does an antivirus run suspicious applications?
    12·1 answer
  • 17.8.1: Writing a recursive math function. Write code to complete raise_to_power(). Note: This example is for practicing recursi
    10·1 answer
  • A client is looking to maximize value from its Cloud investments by baselining, profiling, and prioritizing its human capital ne
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!