users at dreamhouse reality are only allowed to see opportunities they own. leadership wants an enterprise- wide dashboard of all open opportunities in the pipeline so that users can see how the company is performing at any point in time. how should an administrator create the dashboard without changing any sharing setting?

Answers

Answer 1

For profiles that require access to the corporate results, create individual dashboards.

What dashboard feature enables users to view a dashboard that just contains their data?

Using the dashboard viewer Viewers of dashboards perceive data as they do, based on their own data access. Dynamic dashboards are what these types of displays are known as. Charts, tables, gauges, metrics, and other components that you can make using VisualForce can all be used as dashboard components.

What do the three dashboard layers refer to?

Three separate informational levels can be divided into a dashboard: Using graphical, metrics-based data, executives may monitor information. Information for analysts using dimensional, summary data.

To know more about dashboards visit :-

https://brainly.com/question/29023807

#SPJ4


Related Questions

your card was declined by the issuing bank. please try a different card or contact your card issuer with questions.

Answers

If you have any questions, use a different card or get in touch with your card's issuer. When I called my bank to make sure everything was okay on their end, they confirmed that it was.

Why does say to try a new card or get in touch with your card issuer if your card was denied by the issuing bank?

Although you're not logging in with that exact account, your card is connected to one. An account that was linked to your card has since been closed. Even if you have not yet confirmed it, you have linked the card to an account. With the system, your credit card limit has been surpassed.

Why does claim that the issuing bank rejected my card?

The most frequent reasons why will reject your credit card are as follows: You cannot make foreign purchases using your card. The billing or card information you provided is incorrect. your credit card has expired.

to know more about the bank here:

brainly.com/question/14042269

#SPJ4

What are the values for ss and variance for the following sample of n = 3 scores? sample: 1, 4, 7 mean = 4

Answers

The values for ss and variance for the following sample of n = 3 scores are 18 , 9 respectively.

Mean: (1+4+7)/3 = 4

Difference between each score and mean:

1-4= -3

4-4 = 0

7-4 = 3

List of squared difference: 9, 0, 9

Sum of squared difference: 9+0+9 = 18

Variance = SS/n-1 = 18/2 = 9

SS, often known as the sum of squares or just SS, stands for the sum of squared deviations from the mean and is a crucial concept in statistics.

Variance. Variance is created by the sum of the squares. The variance is calculated as the first use of the term SS.

Calculating control limits to determine the range of results anticipated when the performance of the laboratory method is steady is a typical use of these statistics.

Learn more about Variance here:

https://brainly.com/question/29897721

#SPJ4

- Efficient Teams A coding competition is being organized on the HackerRank platform. The participants need to be grouped into teams where each team has exactly two candidates. There are n candidates, where each candidate has a skill denoted by skill[i]. A total of ( n/2) teams are to be formed, such that the total skill of each team is the same. The efficiency of a team is defined as the product of the skill levels of its two members, i.e., for the-skills [1, 3], the efficiency of the team is 1∗3=3. Find the sum of efficiencies of all teams that can be formed satisfying the criteria. If there is no way to create teams that satisfy the conditions, return −1. Note: It can be shown that the answer is always unique. Example The skills of the candidates are skill =[1,2,3,2]. They can be paired as [[1, 3], [2, 2]]. The sum of skills for each team is the same, l.e., 4. The efficiency is computed as: - Efficiency of [1,3]=1∗3=3 - Efficiency of [2,2]=2∗2=4 Return the sum of efficiencies, 3+4=7. Function Description Complete the function getTotalEfficiency in the editor below. getTotalEfficiency has the followino naramatam. Function Desaription Complete the function getTotalEfificiengy in the editor below. getTotalEfficiency has the following parameter: int skill[n]: the skill of each candidate Returns long int: the sum of the efficiencies Constraints −1≤n≤105 - 1≤ skilli0m 105 - n is even. - It is guaranteed that the answer is unique. Input Format For Custom Testing - Sample Case 0 Sample Input For Custom Testing Sample output 13 Explanation Form teams as [1,5],[4,2]. The sums of each pair are 6 . Returns long int: the sum of the efficiencies Constraints - 1≤n≤105 - 1≤skili[]≤105 - n is even. - It is guaranteed that the answer is unique. Input Format For Custom Testing Vample Case 0 Sample Input For Custom Testing STDIN 45421​→​ FUNCTION − skill[] size, n skill =[5,4,​​ Sample Output 13 Explanation Form teams as [11,5],[4,2]. The sums of each pair are 6. The efficiency is computed as: - Efficiency of [1,5]=1∗5=5 - Efficiency of [4,2]=4∗2=8 Sample Case 1 # Complete the 'getTotalefficiency' function below. # # The function is expected to return a LONG_INTEGER. # The function accepts INTEGER_ARRAY skill as parameter. # 8 def getTotalefficiency(skill): 19 # Write your code here 21> if __name == '__main__' 20⋅…

Answers

Using the knowledge of computational language in python it is possible to write code that Function Description Complete the function getTotalEfficiency in the editor below.

Writting the code:

def getEfficiency(li):

 s=sum(li)

 if s%2:

   return -1

 sum_half = s//2

 skills_dict={}

 for i in li:

   if skills_dict.get(i):

     skills_dict[i]+=1

   else:

     skills_dict[i]=1

 res=0

 for i,j in skills_dict.items():

   key1 = i

   key2 = sum_half - i

   if skills_dict.get(key2):

     if j == skills_dict[key2]:

       res = res + j * (key1*key2)

     else:

       return -1

   else:

     return -1

 return res//2

     

n=int(input ())

li=list(map(int,input().split(" ")))

print(getEfficiency(li))

See more about python at brainly.com/question/18502436

#SPJ1

3. Why was Microsoft Azure a good choice for Rockwell?
4. What business problems did Rockwell's partnership with Microsoft and of loT technologies solve or alleviate?

Answers

4) Note that Rockwell Automation chose Microsoft Azure because: Rockwell Automation utilizes Microsoft Azure to efficiently monitor and enhance the fuel supply chain through data analysis, resulting in worldwide productivity gains.

5) Rockwell Automation makes use of Microsoft Azure IoT services for remote asset monitoring and predictive maintenance, which improves supply chain performance and reduces downtime.

What is Microsoft Azure?

Microsoft Azure is the company's public cloud platform. Azure provides a wide range of services, including platform as a service (PaaS), infrastructure as a service (IaaS), and managed database services.

It offers a variety of cloud services, including computing, analytics, storage, and networking, allowing businesses to design, deploy, and manage applications and workloads.

Learn more about Microsoft Azure:

https://brainly.com/question/14312433?

#SPJ1

Full Question:

Rockwell Automation is a worldwide company which focused on provide first-class power, control and IT solution for manufacturing industry. The company main products help its customers to increase their productivity and achieve their organizational goals. For example, PLC, Input Output module, software, industrial safety products and so on. When this company faced with the global demand for fuel, they transform the way to do business by take advantage of Internet of Things(IoT). Rockwell Automation’s customers used Microsoft Azure IoT to monitor their remote assets. This exacting system could help with reduces costlydowntime which they could potential failure in real-time and provide remote troubleshooting.Rockwell Automation operates its business Architecture and Software, and Control Products and Solutions segments. Architecture and Software segment consists hardware, software and communication components of the company which could controlling the customer's industrialprocesses and connecting with their manufacturing enterprise. Architecture & Software has a broad portfolio of products, including control platforms that perform multiple control disciplines and monitoring of applications, including discrete, batch, continuous process, drives control, motion control and machine safety control. Control Products and solutions is another segment which process portfolio of intelligent motor control and industrial control products. Once Rockwell Automation is paper-based system, now changed into exacting system which could help us to achieve new heights and operational intelligence.  Advanced Technology could help the companies to achieve their organizational goals effectively compare to the traditional system.

4) Why was Microsoft Azure a good choice for Rockwell?

5) What business problems did Rockwell's partnership with Microsoft and of loT technologies solve or alleviate?

How to solve upstream prematurely closed connection while reading response header from upstream?

Answers

The way to solve upstream prematurely closed connection while reading response header from upstream is that:

Check the error logs for more information about the cause of the error.

Check the configuration of the upstream server. Make sure that the server is configured to handle the amount of traffic that it is receiving and that it has sufficient resources (e.g. memory, CPU) to process requests.

What is the way to fix the upstream prematurely closed connection?

Another way is to look at the network connection between the upstream server and the client. Make sure that the connection is stable and that there are no issues with the network infrastructure that could be causing the connection to be closed prematurely.

Therefore, one can  also to try reproducing the error in a development or test environment, as this can make it easier to identify the root cause of the issue.

Learn more about closed connection from

https://brainly.com/question/901213

#SPJ1

ring floodlight cam wired pro with bird’s eye view and 3d motion detection, white

Answers

3D motion detection and bird's eye view can identify when and where motion events are initiated in an aerial map view.

What's the point of a bird's eye view?

The bird's eye view is an oversold feature, but the competing pre-roll view is worth it anyway. Additionally, the Ring Spotlight Cam Pro packs a lot of features and performance to give you strong recommendations. The point of a bird's eye view can be used to capture the big picture of the scene or to emphasize the smallness or insignificance of the subject. These shots are typically used to locate battle scenes and characters.

Is Ring Floodlight Pro Worth It?

The Ring Floodlight Cam Wired Pro is worth $50 more than the Ring Floodlight Cam Wired Plus. But if bird's-eye views, louder sirens, enhanced motion zones, and a 5.0GHz connection seem overkill, the Plus is a great money-saving option.

How long does the ring floodlight last?

LEDs last for tens of thousands of hours (about 20 years) before they burn out.

To learn more about CAM system visit:

https://brainly.com/question/12396251

#SPJ4

a programmer writes 500 lines of computer code in 17 days. must there have been at least 1 day when the programmer wrote 30 or more lines of code? why? ---select--- . if the programmer wrote less than 30 lines of code per day for 17 days, then the maximum number of lines that could be written is . since this number is ---select--- 500, it is ---select--- that the programmer wrote 30 or more lines of code during at least one of the 17 days. need help?

Answers

Yes, the programmer must have written 30 or more lines of code on at least one day.

When the programmer wrote 30 or more lines of code? why?

Given data

Total Lines of code= 500

Number of days= 17 days

Number of codes written per day= 500/17

Number of codes written per day= 29.4117

If we multiply 29.4117 by 17

=499.9989

=500 approx

Hence there was never a day when the programmer wrote 30 or more linesThe programmer must have written 30 or more lines of code on at least one day. This is due to the fact that an average of 29.4 lines of code per day equals 500 lines of code divided by 17 days. The programmer must have written at least 30 lines of code on one of the days (and potentially more), as it is impossible to have less than one line of code, in order to have 500 lines of code in total after 17 days.

To learn more about Number of codes written per day refer to:

https://brainly.com/question/23895584

#SPJ4

Which of the following skills would a digital librarlan need that a traditional librarian would not necessarily need?
O web development
O information organization
customer service
O research skills

Answers

Answer: web development

Explanation:

A digital librarian would likely need web development skills, as they would need to be able to manage and maintain a website for the digital library. A traditional librarian may not need this skill, as they may not be responsible for managing a website for their library.

The typical cellphone screen can accommodate no more than 100 characters.

a. True
b. False

Answers

False, An improvement over computer instant messaging is text messaging on a cellphone or personal digital assistant.

Text messaging places an even higher emphasis on conciseness because the average cellphone screen can only hold 160 characters, and the keyboard is much less adaptable. See 5-3: Communications through electronic mail

You can read on-screen text or distinguish colours with the use of colour filters.

There are four settings that may be used to distinguish between colours. To change the filter's intensity after selecting one (apart from Grayscale), pick Intensity:

Red/Green Grayscale Filter (for Protanopia)

Red/Green Filter (for Deuteranopia)

Yellow/Blue Filter (for Tritanopia)

Select the Color Tint option to make the text on your screen easier to read. To make changes, choose Hue or Intensity.

Students who use assistive technology must make a separate request for each hardware or software item. It must be the same technology that has been requested.

Learn more about Messaging here:

https://brainly.com/question/14921620

#SPJ4

How are procedural and object-oriented programming approaches similar?

Answers

The procedural and object-oriented programming approaches are similar, as both approaches are used when writing programs. The correct option is c,

What is object-oriented programming?

Object-oriented programming is a method of computer programming that places more emphasis on data or objects than on logic and actions while developing software.

The three characteristics that set apart object-oriented languages—encapsulation, polymorphism, and inheritance—are also the cornerstones of the object-oriented methodology.

Therefore, the correct option is c, Both approaches are used when writing programs.

To learn more about object-oriented programming, refer to the link:

https://brainly.com/question/11023419

#SPJ1

The question is incomplete. Your most probably complete question is given below:

Both approaches focus on calling attributes and behaviors to write programs.

Both approaches focus on functions, modules, and processes to write programs.

Both approaches are used when writing programs.

Both approaches require little planning in order to write completed programs.

OPSEC planning should focus on:

Routine daily activities to include all unclassified information.

Routine daily activities that only include classified information.

None of the answers apply.

Identifying adversary order of battle information.

Identifying and protecting critical information.
Identifying and protecting critical information.

Answers

OPSEC planning should focus on identifying and protecting critical information. The correct option is D.

What is OPSEC planning?

OPSEC is an analytical process that identifies Critical Information (CI), threats to that CI, and related vulnerabilities and risks of exploitation to that CI, as well as identifying, developing, and implementing remedies to defend that CI.

Planning must center on identifying and safeguarding vital information. It is rarely financially effective or practicable to deny all information about a friendly operation or activity. OPSEC's ultimate purpose is to improve mission effectiveness.

Therefore, the correct option is D, identifying and protecting critical information.

To learn more about OPSEC planning, refer to the link:

https://brainly.com/question/15937294

#SPJ1

Write a function named print_product that accepts three numbers as parameters and prints the product. First, write the print_product function. Then, prompt the user for three inputs, and call your print_product function on those inputs.

Answers

def print_product(num1, num2, num3):

   product = num1 * num2 * num3

   print(f"The product of {num1}, {num2}, and {num3} is {product}.")

# Prompt the user for three inputs

num1 = int(input("Enter the first number: "))

num2 = int(input("Enter the second number: "))

num3 = int(input("Enter the third number: "))

# Call the print_product function on the user's inputs

print_product(num1, num2, num3)

your friend is a software developer. they have windows 10 pro installed on their soho computer. they are creating an application that needs to run smoothly on both windows and linux machines, so it will need to be tested in both of those environments. what would be the best solution for your friend? group of answer choices windows 10 sandbox two separate machines dual-boot system virtual machines on their pc

Answers

Windows Sandbox offers a simple desktop setting for isolating apps safely. The software that is installed inside the Windows Sandbox environment remains "sandboxed" and operates independently from the host computer.

What is Sandbox Windows 10?To run apps securely and separately, Windows Sandbox offers a simple desktop environment. The software that is installed in the Windows Sandbox environment is kept "sandboxed" and operates independently of the host computer.A sandbox is a short-term solution. All of the program's data, state information, and software are erased when it is closed. Every time you open the application, you get a fresh instance of the sandbox. Notably, starting of Windows 11 Build 22509, your data will survive a restart initiated from inside the virtualized environment—useful for installing apps that call for the OS to reload.The sandbox does not have direct access to any of the host's software or apps. You must explicitly install any particular programs you require to run inside the Windows Sandbox environment.The qualities of Windows Sandbox include:All necessary components are part of Windows 10 Pro and Enterprise, which are both versions of this feature. Downloading a VHD is not required.Windows Sandbox is always as spotless as a fresh installation of Windows.Nothing on the device is durable and is hence disposable. Whenever a user closes an application, everything is deleted.Kernel isolation is protected via hardware-based virtualization. In order to isolate Windows Sandbox from the host, it depends on the Microsoft hypervisor, which runs a separate kernel.Utilizes a virtual GPU, sophisticated memory management, and an integrated kernel scheduler to be efficient.

To Learn more About Windows Sandbox  refer to:

https://brainly.com/question/12921009

#SPJ4

Which of the following gives the memory address of integer variable a?
A. *a;
B. a;
C. &a;
D. address( a );

Answers

The memory location of integer variable an is provided by &a;. The type of the variable an is integer, not integer pointer. Therefore, we utilise &a to obtain its address.

Variable and other data are kept in the main memory (sometimes referred to as the memory) while a programme is running. The computer's memory appears to a programme as a set of bytes, each of which has an integer address. For instance, there are bytes with addresses 1, 2, and so on, all the way up to a very big number. A software has the ability to get the byte's current contents at a certain memory location and write a specific value in that byte.

Only 8 bits make up a byte. The majority of the data pieces you employ are bigger than that. For instance, an int value typically has 32 bits, or 4 bytes, of space.

Learn more about Variable here:

https://brainly.com/question/13375207

#SPJ4

What marking (banner and footer) acronym (at a minimum) is required on a DoD document containing controlled unclassified information?
A. FOUO

B. IAW

C. Unclassified

D. CUI - Correct Answer

Answers

CUI is required on a DoD document containing controlled unclassified information.

What is DoD document?
The Department of Defense (DoD) document is a document that is issued by the US Department of Defense (DoD). This document is a set of regulations that govern the activities of the Department of Defense and its personnel. The DoD document establishes the authority, responsibility, and oversight for the Department of Defense and its personnel. It also outlines the rules, procedures, and policies for the department's activities. The document is used to ensure the Department of Defense is following its mission and achieving its goals. The document is updated from time to time to reflect changes in the laws and regulations governing the department. The DoD document is an important document that ensures the Department of Defense is meeting its responsibilities and conducting its activities in a professional and responsible manner.

To learn more about DoD document

https://brainly.com/question/27999913
#SPJ1

The organizational structure of the files and folders on a computer is the _______, a. Start menu b. Menu folder c. File folder d. File directory please select the best answer from the choices provided a b c d.

Answers

The organizational structure of the files and folders on a computer is the file directory. therefore the correct option is d.

The directory structure is the association of lines into a scale of flyers. It should be strong and scalable, it shouldn't unnaturally recast, only be subjoined. Computers have utilized the folder conceit for decades as a path to help freaks keep track of where commodities can be set up. We suggest you should use flyers basically for a storehouse, rather than for association.

There must be one top-position organizational construct, which can only be subdivided in a limited way before the system becomes too clumsy and breaks down. Likewise, information that's dependent on a brochure structure is veritably fragile. However, that contented facts can be lost still, flyers give an ideal tool for managing the data itself, If you put off an image from a brochure that designates what that image is.

To learn more about organizational structure,

https://brainly.com/question/1178560

The type of media that uses laser technology to store data and programs is _______.
hard disk
flash
solid state
optical disc

Answers

The type of media that uses laser technology to store data and programs is an optical disc. The correct option is d.

What is an optical disc?

Low-power laser beams are used in optical storage, an electronic storage media, to store and retrieve digital (binary) data. Because it contains a lens, this disc drive is referred to as a “optical” disc drive.

Chances are if you've ever seen someone with glasses on their face, they purchased them from a “optician” (another word for the lens is optics). A laser beam travels via an optical lens that is part of the optical drive.

Therefore, the correct option is d, optical disc.

To learn more about the optical disc, refer to the link:

https://brainly.com/question/27340039

#SPJ1

why do applications have a white screen that pops up for a few seconds before showing the applcaition

Answers

Your SD card may be the source of the white screen of death problem if you have relocated your programs there and are using them from that location.

What does a white blank screen mean?This error typically results from one of the following causes: There is a hardware issue with your device. A crucial driver or drivers—usually the graphics card driver—are malfunctioning. They can be tainted or simply out of date. The system's operation is being hampered by a background program.Your SD card may be the source of the white screen of death problem if you have relocated your programs there and are using them from that location. By relocating the programs to the internal storage, you can resolve this. Download the Move app to SD card app for free on your phone.

To learn more about screen refer to:

https://brainly.com/question/4413732

#SPJ4

Which feature in access is used to control data entry into database tables to help ensure consistency and reduce errors? subroutines search forms queries.

Answers

To control data entry into database tables to help ensure consistency and reduce errors will be known as forms in data entry.

What are examples and a database?

A database is a planned gathering of data. They support the electronic manipulation and storage of data. Data management is made simple by databases. Let's use a database as an example.

                             A database is used to hold information on people, their phone numbers, and other contact information in an online telephone directory.

What benefits do databases offer?

Users may rapidly, efficiently, and securely share data throughout an organization with the use of database management systems. A data management system allows for quicker access to more precise data by quickly responding to database queries.

Learn more about Database

brainly.com/question/29412324

#SPJ4

Answer: C

Explanation:

18.1 humans have this type of vision; select an answer and submit. for keyboard navigation, use the up/down arrow keys to select an answer. a binocular vision b color vision c stereoscopic vision d all of the above

Answers

Ophthalmologists interpret binocular vision to entail more than simply seeing with two eyes.

What is meant by binocular vision?In biology, binocular vision refers to a type of vision in which an animal has two eyes that are able to face the same direction in order to perceive a single three-dimensional view of its surroundings.

Eagles, wolves, snakes, and people are among examples. Some predatory species, particularly huge ones like sperm whales and killer whales, have their two eyes arranged on opposite sides of their heads.

Binoculars are occasionally used by soldiers, sailors, hikers, tourists, and even some opera goers who use "opera glasses," which are small, specialized binoculars.

The noun is derived from the adjective binocular, which is Latin for "two by two" and meaning "having two eyes" or "including both eyes."

Ophthalmologists consider binocular vision to be more than just using both eyes to see. Our presumption is that utilizing both eyes at once is preferable to using one eye alone.

To know more about binocular vision refer to :

https://brainly.com/question/12460291

#SPJ4

How do you increase the size of the paging file on your windows system?

Answers

The way to increase the size of the paging file on your windows system is by:

To use Sysdm, go to Start > Run and enter it.On the Advanced tab, click.Click Change in the Virtual Memory section.If required, uncheck the box that says "Automatically manage page file size for all disks."Choose the drive that houses your paging file from the list of drives by finding it.Choosing Custom Size

What is a good paging file size?

To maintain system stability, your paging file size should ideally be at least 1.5 times your physical memory and no less than 4 times the physical memory.

The ways to make a paging file in Windows 11 bigger are:

Remove the check mark next to "Automatically manage paging files size for all disks."Choose Custom size from the menu.Set the paging file's starting and maximum sizes in megabytes.Select Set from the menu.

Therefore, Your hard disk will have to do more work as a result of having a larger page file, slowing down all other operations. Increases in page file size should only be made as a temporary workaround when encountering out-of-memory issues. Increasing the computer's memory is a better approach.

Learn more about paging file from

https://brainly.com/question/28305794
#SPJ1

1.A report written in the indirect order _____. first states its main point and then supplies the supporting information is especially beneficial for readers who are in a hurry to receive the most important information first is more likely to use personal pronouns than a report written in the direct order presents the main findings, recommendations, and conclusion in the executive summary begins with whatever introductory material is needed to prepare the reader for the report

2.The _____ statement of a business report provides a clear description of the situation that created the need for the report.

3.

Which of the following is true about problem statements?

Problem statements do not use active voice.

Problem statements eliminate the need for purpose statements.

Problem statements are typically written in the form of a question.

The infinitive phrase is most preferred for writing problem statements.

Problem statements are generally written as declarative statements.

4.

Which of the following is the most appropriate problem statement for a business report on decline of sales?

To determine why company sales have declined

Why have company sales declined?

Management wants to know the reasons for sales decline.

What is the reason for the decline of company sales?

To investigate the cause of the decline in company sales

5.

Possible explanations for or solutions to a problem are termed as _____.

bases

mission statements

hypotheses

purpose statements

problem statements

6.

Which of the following is true about secondary research?

It primarily involves gathering data through methods of direct observation.

It uncovers information firsthand.

It uses material that someone else has published.

It includes user testing.

It primarily involves gathering data through experiments.

7.

Secondary research produces information primarily through the use of _____.

experiments

surveys

websites

interviews

observations

8.

If a user finds it difficult to think of terms to broaden his or her search, he or she must _____.

eliminate citations with a particular term

retrieve citations that contain only the search terms without variations

look at the keywords or descriptors of the items that have already been identified

refrain from using Boolean operators

use the NOT operator

9.

Which of the following is true of reports?

All reports have a consistent format and an equal number of components.

As the need for formality decreases, the number of components in a report increases.

When the situation is informal and the report is short, prefatory pages are included.

A business writer should decide the makeup of a report on the basis of its topic and cost.

Less complex problems and less formal situations will require less elaborate reports

10.

Marco is in the process of preparing an internal report to explain the recent increase in the number of product returns at ZenMark Fashions. Marco's survey reveals that the returned products are of inferior quality and do not meet ZenMark's regular standards. This increase in product returns is found to coincide with the switch to a different raw materials supplier. Marco's suggestion is to revert to the original raw material supplier despite the costs involved being 30% higher. In this scenario, Marco should probably _____.

present the report in casual or informal language

include all the prefatory elements in his report

write his report in the indirect order

write his report in the direct order

place the recommendations and conclusions at the beginning of the report

Answers

Here are the answer of your 10 question: number 1, begins with whatever introductory material is needed to prepare the reader for the report; number 2, problem; number 3, problem statements are generally written as declarative statements; number 4, management wants to know the reasons for sales decline; number 5, hypotheses; number 6, it uses material that someone else has published; number 7, websites; number 8, look at the keywords or descriptors of the items that have already been identified; number 9, less complex problems and less formal situations will require less elaborate reports ; number 10, write his report in the indirect order.

What is business report?

Business report is a group of analyses and data that make a company easier to access the information they need. As business report used for internal of the organization, it contains the problem that organization face. The statement of the problems are generally written in the declarative form. In order to gain the data for the business report, organization will do researches based on hypotheses they made.

Learn more about business report here:

https://brainly.com/question/11599232

#SPJ4

What is the role of the media in elections ?

Answers

The media has wide-ranging effects on the political behaviour of a democratic government.

What is the role of the media in elections ?Media serves as the gatekeeper for the democratic political systems.Their job is to disseminate campaign news and information so that voters may better understand the candidates they will be voting for and their positions on various subjects. They hold debates, which are crucial since, after conventions, the majority of people watch debates. However, independent voters who are still undecided tend to watch the majority of discussions. Social media can assist voters in becoming more informed about politics, but it can also disseminate incorrect information that may adversely affect the voters' attitudes.Contradictory political opinions have the potential to generate conflict and the breakup of friendships.

To learn more about Media , refer:

https://brainly.com/question/24814095

#SPJ4

The SQL command that lets you select attributes from rows in one or more tables or views is ____.
a. INSERT
b. SELECT
c. COMMIT
d. UPDATE

Answers

Answer:

SELECT

Explanation:

Those that work in the Printing Technology pathway are typically
-self-employed, and work indoors.
-self-employed, and work outdoors.
-not self-employed, and work outdoors.
-not self-employed, and work indoors.

Answers

Answer: self-employed, and work indoors.

karen, a software engineer, finds out that some of the laptops that his colleagues are using for software testing have been infected by a type of virus that has slowed down their work to a large extent. karen writes a report with a solution to the problem and presents it to her manager. this type of report is an example of a(n) .

Answers

Antivirus software is a type of program used to guard against, check for, find, and remove viruses from a computer. Most antivirus programs run on autopilot after installation to offer real-time defense against viral threats.

What software testing have been infected by a type of virus?

A computer virus is a harmful piece of software that replicates itself on other programs, the machine's boot region, or documents in order to spread. Changing the way a computer operates. A virus spreads throughout computer systems following some kind of human interaction.

Therefore, this type of report is an example of a malware activity.

Learn more about software testing here:

https://brainly.com/question/24065194

#SPJ1

You computer's IP address is 201.18.149.37/28. Which of the following is a valid default gateway for this address?

a. 201.18.149.46
b. 201.18.149.17
c. 201.18.149.32
d. 201.18.149.48

Answers

Since you computer's IP address is 201.18.149.37/28. the option that is a valid default gateway for this address is option a. 201.18.149.46

Have all computers been assigned an IP address?

IP addresses are essentially the means by which computers on the internet identify one another. Your internet service provider (ISP) assigns IP addresses, each of which is distinct, to your internet-connected devices. Since each and every device connected to the internet has an IP address, there are billions of IP addresses in use.

Therefore, since IP address is assigned, or leased, to an individual by an Internet service provider and is an essential element to accessing the Internet itself. IP addresses reveal the source of data and the destination it should be routed to. IP addresses can either be static or dynamic.

Learn more about IP address from
https://brainly.com/question/14219853

#SPJ1

mary is re-configuring her network that currently uses the standard 10mbps of bandwidth using twisted pair cabling. she wants to upgrade to a faster network. which ethernet standard is most likely currently installed?

Answers

Workstations connected to a network via Dynamic Host Configuration Protocol (DHCP) will immediately receive TCP/IP addressing information (see IETF draft standard RFC 2131, 2132, and 3397).

What is Dynamic Host Configuration Protocol ?Windows Server 2003's DHCP MMC makes it possible to backup and restore the DHCP database without the use of command-line tools.Two local administrative groups, DHCP Administrators and DHCP Users, are added to the server during the installation of a DHCP server by the installation program. While DHCP Users only have read-only access to the DHCP configuration and scopes, DHCP Administrators are fully in charge of DHCP (but not other components of the server).When your scopes run out of IP addresses or have already done so, DHCP server statistics will notify you with variously colored triangular icons.Workstations connected to a network via Dynamic Host Configuration Protocol (DHCP) will immediately receive TCP/IP addressing information (see IETF draft standard RFC 2131, 2132, and 3397). Network address, subnet mask, gateway, and DNS server address are the settings that DHCP sets most frequently. Time server, domain name, and a host of other choices are among the many that you can configure with DHCP. A fact that is frequently forgotten is that DHCP is not exclusive to Windows networks; there is a similar protocol called Bootstrap Protocol (BOOTP) that performs many of the same functions as DHCP.

To Learn more About Dynamic Host Configuration Protocol refer to:

https://brainly.com/question/14234787

#SPJ4

What is output?

plsss help meee

Answers

The output of the code would be:

25

25

25

In this code, the variable "val" is first defined as 25 outside the function "example". Then, within the function "example", the value of "val" is set to 15. However, this does not affect the global value of "val", which remains 25.

When the first and second print statements are executed, the value of "val" is printed, which is 25. When the "example" function is called, the value of "val" within the function is set to 15, but this change is not reflected in the global scope.

Finally, when the third print statement is executed, the value of "val" is again printed, which is still 25.

Overall, the output of the code is 25, 25, 25.

Which of the following are options you can select in the top values list for a query?

a. 25%
b. All
c. 5

Answers

The top values list for a query:

a. 25% - This option allows you to select the top 25% of values from the query results.
b. All - This option will select all the values from the query results.
c. 5 - This option allows you to select the top 5 values from the query results.
d. Top - This option allows you to select the top value from the query results.

What is query?
Query
is a request for data or information from a database. It is a specific set of instructions that allow a user to extract information from a database. Queries are written in a special language called Structured Query Language (SQL). Queries are used to find out specific information from a database, such as which employees have exceeded their quotas, which orders need to be shipped, or what products are in stock. Queries can also be used to create or modify tables, or to add, delete, or modify data in a database. Queries are often used to build reports and can also be used to automate processes.

To learn more about query
https://brainly.com/question/25266787
#SPJ1

Complete Question.

Which of the following are options you can select in the top values list for a query? with explanation.

a. 25%

b. All

c. 5

d. Top

Other Questions
Which of the four types of data analytics seeks to recognize what is going on as well as the likely forecast and make decisions to achieve the optimal results possible? benefits committee decide to limit the number of participants who can receive a lump sum pension plan What theme is demonstrated by Scrooge's visit from the Ghost of Christmas Past? your favorite sporting goods store puts all of its water skiing equipment in a clearance sale right after labor day. this scale indicates the store manager is using: ____. How do you know if a shape is SAS or SSS? How does fitness levels affect risk of injury? What are the 3 things Weber focused on? Can you get food poisoning from frozen fish? A recent survey found that about 73.2% of all gasoline purchases at a certain service station chain are paid with a credit or debit card. If 250 gasoline purchases completed at this chain are randomly selected, find the probability that at most 195 of those purchases are paid with a credit or debit card. Use Excel to find the probability, rounding your answer to four decimal places. Divide the compounds below into electron-poor and electron-rich groups. Electron-Poor Compounds: Electron-Rich Compounds: What prefix is used for pharmacist? Which of the following has the smallest atomic radius?A. Rb B. K-C. kD. Rb+ Which of the following was an important event for Islam?A. The Diaspora of IslamB. Schisms between orthodox churchesC. The Golden Age of IslamD. Covenant of Rome converting the empire to Islam PLEASE HELP ME IM STUCK ON IT Which of the following types of intelligence would be most important in answering trivia questions?A FluidB CrystallizedC Bodily kinestheticD CreativeE Practical How are Karl Marx and Old Major different? For a chemical reaction in a closed system, mass cannot be ______________ or _______________. We can say that throughout the reaction mass is _____________. Solve Please and Thank U Opinion and bias in written historical sources illustrate the need to be aware of? Draw the electron configuration for a neutral atom of titanium. energy