What is the next step an organization should take after capturing and collecting data?

Answers

Answer 1

Answer: I think this is right Step 1: Identify issues and/or opportunities for collecting data. Step 2: Select issue(s) and/or opportunity(ies) and set goals. Step 3: Plan an approach and methods. Step 4: Collect data.


Related Questions

write an algorithm to print the first 100 odd numbers​

Answers

Answer:

ALGORITHM :

Step 1: Start

Step 2: Declare variable c of integer type

Step 3: Set c=0

Step 4: Repeat step 4.1 to 4.3 while (c<=100)

Step 4.1: if (c%2 != 0)

Step 4.2: then print c

Step 4.3 : c=c+1

Step 5: Stop

FLOWCHART:

Explanation:

What is the difference between the wiring configurations for a residential, 8-position, 8-contact (8P8C) modular plug and jack in the Universal Service Order Codes (USOC) and ANSI/TIA/EIA 570-B

Answers

The key variance between how the two wiring configurations described are in the way that the pair numbers three and four are situated or placed.

What is Service Order Codes (USOC)?

The above refers to a system of specifications that was created by Bell Systems company to enable the connection of equipment used in buildings both in homes and in public places.

The ANSI/TIA/EIA 570-B on the other hand is the standard that the cabling for telecommunications must meet.

Hence, the primary variance between how the configuration or settings of the wiring for a residential, 8-position, 8-contact (8P8C) modular plug and jack in the Universal Service Order Codes (USOC) and ANSI/TIA/EIA 570-B is in the way that the pair numbers three and four are situated or placed.

Learn more about wiring at:

https://brainly.com/question/25922783
#SPJ4

100 POINTS FOR ANYONE WHO CAN DO THIS!
Make the following modifications to the original sentence-generator program:

The prepositional phrase is optional. (It can appear with a certain probability.)
A conjunction and a second independent clause are optional: "The boy took a drink and the girl played baseball".
An adjective is optional, it may or may not be added to the sentence to describe a noun: "The girl kicked the red ball with a sore foot".
"Optional" is implying that the program should include these elements in a semi-random frequency.

You should add new variables for the sets of adjectives and conjunctions.

Answers

Let's check what can be modified

Before calling def we need adjective and conjunctions stored inside variables

Store them(You may change according to your choice)

[tex]\tt adjectives=("foolish","bad","long","hard")[/tex]

[tex]\tt conjunctions=("and","but","for","after")[/tex]

We have to make optional ,easy way ask the user to do instead of yourself .

[tex]\tt con=input("Enter\: yes\: if \:you \:want \:to \:use \:conjunctions:")[/tex]

[tex]\tt adj=input("Enter\:yes\:if\:you\:want\:to\:use\: adjectives:")[/tex]

If they click then we can proceed else no problem let the program run

[tex]\tt def\: conjunctionPhrase():[/tex]

[tex]\quad\tt if\: con=="yes":[/tex]

[tex]\quad\quad\tt return\:random.choice(conjunctions)+"\:"+nounPhrase()[/tex]

[tex]\quad\tt else:[/tex]

[tex]\quad\quad\tt continue[/tex]

You may use pass also

[tex]\tt def\: adjectivePhrase():[/tex]

[tex]\quad\tt if\:adj=="yes":[/tex]

[tex]\quad\quad\tt return\:random.choice(adjectives)+"\:"+nounPhrase()[/tex]

[tex]\quad\tt else:[/tex]

[tex]\quad\quad\tt continue[/tex]

A user in a small office environment explains to you that his office implements a small microsoft workgroup. users commonly share folders with each other. which access control model is represented in this example?

Answers

65DAC, is access control model is represented in this example, A user in a small office environment explains to you that his office implements a small Microsoft workgroup.

What are folders?

Folders are the virtual location where data is stored in the computer, there can be the several folders in a computer can be made and can name it accordingly. The folders can store the maximum GB files in it.

Thus, it is 65DAC

For more details about folders, click here:

https://brainly.com/question/17616752

#SPJ1

what are the methods of gilding

nonsense will be immediately reported. ​

Answers

Methods of gilding include hand application and gluing, typically of gold leaf, chemical gilding, and electroplating, the last also called gold plating. Parcel-gilt (partial gil) objects are only gilded over part of their surfaces.

The which command _________________. a. can only be used to search for executables b. searches for a file in all directories starting from the root c. is not a valid Linux command d. searches for a file only in directories that are in the PATH variable

Answers

Answer: D. Searches for a file only in the directories that are in the path variable

Write an algorithim and flowchart to check it the temperature is more than 25°. If it more than 25°C switch fan on else off.​

Answers

Answer:

write the sly flowchart

Explanation:

#stdlib.etc

main()
{

    int temp;
    bool fan = false;

    print("enter the frigin temperature: ");

    read(temp);

    if (temp > 25)

     {
         fan = true;
         print("the fan is on");
     }
     else
      {

           print("the fan is off");

      }

      return 0;

}

a. What is this age called?

Answers

Answer:

The Information Age (also known as the Computer Age, Digital Age, or New Media Age) is a historical period that began in the mid-20th century, characterized by a rapid epochal shift from traditional industry established by the Industrial Revolution to an economy primarily based upon information technology.

OR

Age, epoch, era, period all refer to an extent of time.

Explanation:

can i have brainliest pls?

i hs no life hahahaha

Answers

Answer:

PLEASE ANYONE HELP WITH THIS

Explanation:

Answer:

me too lol

Explanation:

How can researching information on the Internet best help creative writers?

A. They can first write an informational piece.

O B. They can practice editing grammar mistakes.

C. They can procrastinate before writing.

OD. They can look for descriptive words to use.

Answers

Researching information on the Internet can best help creative writers to  look for descriptive word to use. The correct option is D.

Who are the creative writers?

The one who writes or creates a content to market an organization or create question answers for an academic firm.

The creative writers must have a wide knowledge of vocabulary to create unique and copyright content with less plagiarism.

So, to increase their vocabulary, they do research on the internet to find the descriptive word. Thus, the correct option is D.

Learn more about creative writers.

https://brainly.com/question/4086268

#SPJ1

what is a computer?write any four features of computer​

Answers

Answer:

A computer is defined as an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

Four features of a computer would be CPU, GPU, Memory, and Motherboard.

Explanation:

Computer is an electronic machine which accepts raw data from the user , process the data according to the predefined set of instructions, gives and stores the result or instructions....

Or

A computer is an electronic device that can perform several task according to the given instructions...

The four features of computer are :

Speed

Accuracy

Versatility

Diligence

Storage etc....

[tex]...[/tex]

write the c programming that takes the input of 25 employees salaries and count the number of employees who are getting salary between 30000 and 400000

Answers

Using the computational language in C++ it is possible to write a code that uses the salary values ​​of the employees of a company dividing between the number of employees.

Writing the code in C++ is possible:

#include<stdio.h>

#inc1ude<conio.h>

void main()

{

int i, n, count = 0;

Long int salary[25];

clrscr();

printf(“\n Input salary of 25 persons:- ");

for(i=0;i<25;i++)

scanf("%ld", &salary[i]);

for(i=0;i<25;i++)

{

if(Salary[i]>30000 && salary[i]<40000)

count++;

}

printf("There are %d persons whose salary is in between 30000 and 40000",count);

getch();

}

See more about C++ code brainly.com/question/17544466

#SPJ1

If you attempt to add an int, a byte, a long, and a double, the result will be a(n) __________ value.

Answers

It’s 29+69= -39 because there are a parental axis and that causes her base to be in the car with a car and it. J I just don’t have to go use them for the next few minutes.

Select the correct answer.
which certification would be best for a web applications developer ready to move up from an entry-level position?
oa comptia a+
ob. cisco certified design associate
oc. microsoft certified solutions developer (mcsd)
od. oracle certified associate

Answers

The certification that would be best for a web applications developer ready to move up from an entry-level position is CompTIA a+.

What is the most useful IT certification?

There are a lot of most demand certifications and they include

CompTIA (A+, Cloud+, Security+)Microsoft Certified Azure Solutions Architect Expert.Information Technology Infrastructure Library (ITIL), etc.

Note that CompTIA A+ and other entry-level certifications is used to prepare a person for an entry-level IT position and as such, The certification that would be best for a web applications developer ready to move up from an entry-level position is CompTIA a+.

Learn more about certifications from

https://brainly.com/question/24931496

#SPJ1

Answer: microsoft certified solutions developer (mcsd)

Explanation: got it right on test

ANSWERS FOR PLATO!!!

What does the second element in a pair of HTML tags contain?

ANSWER: /

when would you use the code snippet <input...(randome code stuff)...> American?

ANSWER: while inserting a RADIO BUTTON

assume you are creating a website for school... yada yada,

ANSWER: <img>

Why is it preferable to code web pages in HTML format?

ANSWER: to display properly as search results in all browsers

drag tiles, somthinf about creating a web page and wich dose the html tags define


new paragraph ---> <p>

define a term ---> <dd>

define single line break ---> <br>

define heading ---> <h3>


HOPE THIS HELPS GUYS YOU GOT THIS KEEP ON KEEPING ON <3<3<3<3 #platogang #edementumegang​

Answers

The thing which the second element in a pair of HTML tags contain is "/" and is known as the Closing Tag.

What is an HTML Tag?

This refers to the keywords that are used in the building block of a website to indicate how a web browser would interpret and display the content.

Hence, we can see that in HTML tags, there are always the Opening and Closing Tags that are used to enclose lines of code and when paired together are known as container tags.

Read more about HTML elements here:

https://brainly.com/question/9069928

#SPJ1

Write a Pascal program that will prompt the user to enter the radius of a circle.
The program should calculate the area and the circumference of the circle and display the result

Answers

A Pascal program that will prompt the user to enter the radius of a circle is as here as follows.

How is the circumference of a circle programmed?

The circumference of a circle can easily be calculated with the following formula. Circumference = 2*pi*r where r is the radius of the circle and the value of pi = 3.1415.

int main() { int rad; swimmers PI=3.14, area, ci; printf("\nEnter radius of circle: "); scanf("%d", andrad); area = PI * rad * rad; printf("\nArea of circle : %f ", area); ci = 2 * PI * rad; printf("\nCircumference : %f ", ci); return (0):

Read more about the  Pascal program:

https://brainly.com/question/23566992

#SPJ1

It is important to consider design details when creating an api because: ______________

a. the api will go through a rigorous code review process.
b. the api should be intuitive for other engineers to use.
c. the api will be displayed to the front-end users.
d. apis have strict design requirements engineers must adhere to.

Answers

It is very important for programmers to consider design details when creating an API because: B. the API should be intuitive for other engineers to use.

What is an API?

API is an abbreviation for application programming interface and it refers to a software intermediary or computing interface that comprises a set of executable codes, tools and protocols that helps software applications and computers to communicate with each other, as well enable the exchange of data.

Some examples of common application programming interface (APIs) are:

Go-ogleFace-bookTwi-tter

In conclusion, it's very important for programmers to consider design details when creating an API because it should be intuitive for other engineers to use.

Read more on API here: https://brainly.com/question/20910074

#SPJ1

Answer: B. the API should be intuitive for other engineers to use

Effective data communication relies on many components to function collaboratively and reliably. When troubleshooting network problems, you'll need to be able to identify which component is most likely causing the problem based on the symptoms you're observing. Identify the most likely issue causing the problem in each scenario.

Answers

The likely issue cause of the problem in the scenario.

Modem: Problem: Dante's home router reports that it's not connected to the internet.

What is the reason for the above scenario?

The reason for the modem problem may be due to  some issue that occurs with the connection of the modem device

Therefore, The likely issue cause of the problem in the scenario.

Modem: Problem: Dante's home router reports that it's not connected to the internet.  because it is only with the modem that he can connect to the internet and thus need to solve the issue.

Learn more about  communication from

https://brainly.com/question/26152499

#SPJ1

A(n) ________ is often developed by identifying a form or report that a user needs on a regular basis.

Answers

A user view is often developed by identifying a form or report that an end user needs on a regular basis.

What is a database?

A database can be defined as an organized and structured collection of factual data that are stored on a computer system as a backup and are usually accessed electronically.

In database management system (DBMS), a user view is often developed by a software developer through an identification of a form or report that an end user needs on a regular basis.

Read more on data here: brainly.com/question/13179611

#SPJ1

how can you use Upload Files & Folders View when designing A website.

Answers

In the process of designing a website, an end user can upload files and folders by navigating to Site Tools > Site > File Manager.

What is a website?

A website simply refers to a collective name which connotes a series of webpages that are linked together (interconnected) with the same domain name, so as to provide specific information to end users.

In Computer technology, an end user can upload files and folders when designing a website by navigating to Site Tools > Site > File Manager.

Read more on website here: https://brainly.com/question/26324021

#SPJ1

Brent recently received funding for his fast-food chain in Michigan. As a result, he hires Angela to set up a top-level domain so that she can start an online delivery system through his web portal as well. He wants Angela to put a unique domain name so that his website appears a little different from the other competitors. Analyze which of the following top level domain names Angela should opt for under such requirements. a. .mil.
b. .biz.
c. .eu.
d. .com.

Answers

The option among the top level domain names that Angela should opt for under such requirements is .biz.

What's a domain name?

Domain names are known to be formed to create IP addresses very easy so that one can easily remember.

Note that the domain name of biz is better for Angela to use as it is suitable for her business and as such, The option among the top level domain names that Angela should opt for under such requirements is .biz.

Learn more about domain name from

https://brainly.com/question/17062016

#SPJ1

In company a, there is a team that performs day-to-day it operations with a focus on security. they are responsible for a wide range of tasks, such as network security, device provisioning, and application patching/deployment. which security operation is being carried out by this team?

Answers

The security operation being carried out by this team is Administrative in nature.

What is the role of an Administrators?

An Administrators is known to be a person who works or handles the day-to-day deployment, operation and looking of an IT environment.

Note that their areas of concern are the systems, networks and applications as well as others and as such, The security operation being carried out by this team is Administrative in nature.

Learn more about  security operation from

https://brainly.com/question/371967

#SPJ1

What makes a recipe for a meal an example of an algorithm?
A. It results in a finished meal that is consumed.
B. It is outlined as a set of instructions.
C. It includes a number of ingredients.
D. It can be shared electronically over the Internet.

Answers

Answer:

b

Explanation:

it outlines as a set of instructions so you can do it correctly.

Question 3 of 10
in which part of the Scratch interface does a programmer combine code
blocks to build the program?
OA. Block palette
OB. Stage
OC. Scripts area
O D. Sprite info pane

Answers

The part of the Scratch interface that a programmer combine code

blocks to build the program is the Block palette.

Which part of the sprite screen has programming blocks?

The block palette is known to be the part where all the code blocks can be found.

Note that all the Blocks are said to be color coded by category and as such, The part of the Scratch interface that a programmer combine code

blocks to build the program is the Block palette.

Learn more about Scratch interface from

https://brainly.com/question/27820529

#SPJ1

are tigers and goldfish related

Answers

Yes, they are by law of America

Define a function calc_pyramid_volume() with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a recta

Answers

Answer:

Te ayuda

Explanation:¿Cuál es la fórmula para calcular el volumen de una pirámide rectangular?

Resultado de imagen para Defina una función calc_pyramid_volume() con los parámetros base_length, base_width y pyramid_height, que devuelve el volumen de una pirámide con una recta

El volumen de una pirámide rectangular es definido como el espacio tridimensional ocupado por esta figura. Podemos calcular la medida de este volumen al multiplicar al área de la base por la altura de la pirámide y dividir por tres.

How does a cloud-first strategy differ from other approaches to cloud?

Answers

Cloud-first strategy differ from other approaches as It keeps all the services performed by legacy systems while moving to the Cloud in a staggered approach.

What is a cloud first strategy?

The change of cloud computing has brought about  “cloud-first” strategy.

This  is known to be a way to computing that tells that a firm should look first to cloud solutions when creating new processes or taking in old processes before taking in non-cloud-based solutions.

Note that Cloud-first strategy differ from other approaches as It keeps all the services performed by legacy systems while moving to the Cloud in a staggered approach.

See options below

it enables an organization to completely move to the cloud without infrastructure or support requirement

it keeps all the services performed by legacy systems while moving to the cloud in a staggered approach.

it partners technology with multiple other disciplines for comprehensive business transformation.

it uses artificial intelligence to automate all business processes and completely eliminate human error.

Learn more about cloud from

https://brainly.com/question/19057393

#SPJ1

A major way the National Information Infrastructure Protection Act of 1996 amended the Computer Fraud and Abuse Act was the substitution of the term ______ computers for federal interest computers so that the statute now protects any computer attached to the Internet.

Answers

A major way the National Information Infrastructure Protection Act of 1996 amended the Computer Fraud and Abuse Act was the substitution of the term protected computers for federal interest computers so that the statute now protects any computer attached to the Internet.

What is the National information infrastructure protection act?

It is an amendment act of Computer Fraud and Abuse Act and was enacted in 1996. The act is for the cyber crimes and frauds.

Thus, the correct option is protected.

Learn more about National information infrastructure protection act

https://brainly.com/question/13371540

#SPJ1

In what year was the first permanent photographic image created?
O 1906
O 1826
O 1609
O 1786

Answers

Answer:

1826

Explanation:

it was in 1826 when the first permanent photographic image was created.

Which three options below describe typographic hierarchy?

Select all that apply.

A
the importance of information shown through the text

B
the presentation of text in terms of structure

C
the placement of the text defining its flow and hierarchy

D
the use of only upper case text

Answers

The three options that describe the typographic hierarchy are given below:

The importance of information is shown through the text.The presentation of the text in terms of structure.The placement of the text defines its flow and hierarchy.

Thus, the correct options are A, B, and C.

What is Typographic hierarchy?

Typographic hierarchy may be characterized as an approach that utilizes typography: the size, font, and layout of distinct text components to produce a hierarchical division that can authenticate users where to look for specific information.

The purpose of using this methodology is to focus on the main points of the article accordingly. It increases the sense of understanding of the readers with focus.

Therefore, it is well described above.

To learn more about Typographic hierarchy, refer to the link:

https://brainly.com/question/12076206

#SPJ1

Other Questions
Which is true of WWII?Question 18 options:London was one of the few cities in Europe that was not bombed.The United States suffered more losses than any other Allied country.More people were killed in than any other war in history.Few civilians felt the impact of the war. please help What is the measure of m?m = [?]Give your answer in simplest form. How were the following people interrupted in what they were doing Most of the carbon in the carbon cycle exists as carbon dioxide inA. fossils.B. the oceans.C. the atmosphere.D. nucleic acids. Which evidence best supports Curtiss opinion that Dred Scott should be free because he lived in a free territory? Check all that apply.The Constitution refers to slaves as persons held to service in one StateThe Convention which framed the Constitution . . . has . . . the power to regulate commerce.A citizen of the United States owns slaves in Cuba.Does this legislation deprive him of his property without due process of law?Acts of Congress as prohibited slavery and involuntary servitude within that part of the Territory of Wisconsin . . . were constitutional and valid laws. Which of the follwing functions at the same organizational level as the skin in the human integumentary system? -a-10 = 5a +8 pleasee help me In soccer, the player who receives the ball a large share of the time is called the _________.A)captainB)kickerC)target playerD)sweeperThis is a forward position sometimes called a striker The box plot below represents some data set. What is the interquartile range (IQR) of the data? 3x+2y=39 5x-y=13What is the solution to the system of equations What are some slogans for fracking? Which is a mood that an author could create in a text?apologeticcasualdisapprovinghopeful URGENT PLEASE HELP!!petrus takes a bus to school. The bus travels at an average speed of 40km/h. The school is 9km from his house. How many minutes does he take to get to school? Competition among economic units ______. Multiple select question. should not occur within a market system diffuses economic power within the businesses and households that make up the economy. implies that producers can enter or leave an industry is not congruent with the concept of self-interest Can somebody please help answer this word problem using grass method? And showing how u get the answer thanks!!!WILL MARK BRAINLIEST FOR WHOEVER ANSWERS THIS !!! :DD Select ways we can restore balance to the environment.conservationrecycling cans, newspapers, clothgo campingreplant treeseach adult American to own his own carbuy a recreational vehicleridesharing (carpooling) What country is the largest democracy in the world with an estimated 850,000 million eligible voters?. you must realize that your interpretation of a poem will be a personal onetrue or false a rectangle with a perimeter of 30 centimeters is twice as long as it is wide. what is the area of the rectangle in square centimenters? The government is the leading employer in both alaska and hawaii. true false