Answer:
c. 360-degree review
Explanation:
360-degree feedback mostly serve as a process of communicating strengths and weaknesses to a targeted manager or the one doing the review.
A managers can decide to get better or improve their performance through a 360-degree review feedback.
The review and the feedback gottrn often provides an external source by making available information that increases managerial self-awareness.
The combination of systematic coaching and the feedback gotten can be used to improve self awareness.
When the feedback gotten is combined with systematic coaching, it has a positive effect on work attitudes and intentions to quit. This in turn reduces the costs through decreased turnover, improved job satisfaction, and performance related commitment
The main aim of feedback is often to achieve change.
A manager that wants to carry out a comprehensive assessment will have to do 360-degree review.
The U.S. is a major player in the global media domain. However, other nations play a role in creating a dominant ideology, as evidenced by the popularity of ________, which originated in Sweden.
Answer:
The answer is "Authorization for mobile wiretaps on American citizens."
Explanation:
The term media includes advertising, documentaries, painting, and graphic, which allows you to use a blog's domain name, and it can also provide you to create a fake profile. In certain countries, a prevailing philosophy is performed, as demonstrated by the prevalence of telecommunications wiretaps approved in Sweden by US residents.You upgrade your network to 1000 Mbps from 100 Mbps. You install a new 1000-Mbps network adapter into your Windows system. You check the device manager and see no errors or warning. You configure the TCP/IP settings to be as they were for the previous network adapter. Upon restarting the computer, you cannot access the network. You ping your IP address locally and receive the error message, "Request timed out." You then ping 127.0.0.1 and receive the same error message. What do you do?
Answer:
Replace the NIC
Explanation:
A node needs a network connectivity to perform and function well as part of a cluster. If a single network interface is available, the breakdown of the other network interfaces will not cause service interruption but will most likely cause service degradation.
Simple ways to know if you need to change your NIC is to go Click Start and the you right-click on Computer, then you toggle over and click Properties, it will bring a window box and From there, click Device manager. Screen the window to where it says "Network adapters". If there's a question mark or an exclamation there, then you have an ethernet problem that needs troubleshooting; if not then you're OK.
When approaching a bicyclist from the rear, you should slow down and
Choose an answer:
A. Wait until it is safe to pass the bicyclist with at least three feet of clearance.B. Stay as far right in the right lane as possible without hitting the bicyclist.C. Tap your horn to warn the bicyclist
Answer:
A. Wait until it is safe to pass the bicyclist with at least three feet of clearance.
Explanation:
This is one of the traffic safety precautions to follow when driving especially in most parts of the United States of America.
Traffic safety guidelines are a list of Rules and instructions usually available in manuals and online made available by the government to its driving population in order to maintain law and order and prevent accidentals on the road. When effectively followed this guidelines can help to reduce accidents by a high Margin.
The analysts at Techno Info Systems are considering the four-model approach to system development for a new client. If they make use of the four-model approach, which of the following is a likely outcome?
A. It will not be possible to get ac clear picture of the current system functions before modifications are made.
B. Time taken to develop the model increases.
C. The requirements of a new information system will always be different from the current information system.
D. Costs need to develop a logical and physical model of the current system will be less.
Answer:
B
Explanation:
...if they make use of the four-model approach, the time taken to develop the model would increase.
Cheers
You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not support auto- MDI. Which type of cable should you use.
Answer:
The correct answer to the following question will be "Straight-through ".
Explanation:
It's a kind of twisted-pair wire used for interact a device to a networking center like a modem or router in LAN.
By linking two separate kinds of connected devices, use this cable.This connection is often applied to this as a repaired cable, too.So, it's the right answer.
A stack is initially empty, then the following commands are performed: push 5, push 7, pop, push 10, push 5, pop, which of the following is the correct stack after those commands (assume the top of the stack is on the left)? A. 5, 10, 7, 5.
B. 5, 10.
C. 7, 5.
D. 10, 5.
Answer:
d
Explanation:
___________provides vital protection and maintenance services for system hardware and software, including enterprise computing systems, networks, transaction processing systems, and corporate IT infrastructure.a. User support
b. Database administration
c. Systems support and security
d. Network administration
Answer:
C) System support and security.
Explanation:
The aspect of systems support and security in ICT has to do with troubleshooting, fixing and installation of computer system software and hardware of many different types.
It also involves the monitoring and implementation of security measures to protect networks, systems and information.
Also, innovation of security architectural designs and identification and resolution of the causes of security threats and application of effective secured enhancements.
It also has to do with the testing of security softwares for possible breaches and fixing them if found.
System support specialists and security engineers work in these fields and are responsible for these roles. They may work independently or sometimes in groups, brainstorming and contributing creative ideas for their companies.
A recent antivirus scan on a server detected a Trojan. A technician removed the Trojan, but a security administrator expressed concern that unauthorized personnel might be able to access data on the server. The security administrator decided to check the server further. Of the following choices, what is the administrator MOST likely looking for on this server?
a. Trojan
b. spyware
c. adware
d. ransomware
Answer:
B. Spyware
Explanation:
Spywares are silent software that steals sensitive information such as internet or company data, and other similar information. They are oftentimes unnoticed and supply stolen data to external users, data centers or advertisement companies.
Sophisticated spyware can go as far as installing software to manipulate your settings or use passwords on your behalf.
Even though the Trojan was detected in our scenario, The Trojan would have created a backdoor to allow spyware in. This spyware will not be easily noticed by the technician or the antivirus, however, it could be more devastating than the Trojan.
That is why the security administration expresses concern over a breach despite the removal of the Trojan.
Samantha was hired to perform an internal security test of company XYZ. She quickly found that all networks are making use of switches instead of traditional hubs. This greatly limit her ability to perform network sniffing for information gathering. Which of the following techniques could she use use to gather information from the switched network or to disable some of the traffic isolation feature of the swtich?a. sniff in promiscuous mode b. ethernet zapping c. ARP spoofing d. TCP session hijacking
Answer:sws
Explanation:swwswswsswswsw
Microsoft ____________________ is a complex, full-featured firewall that includes stateful packet filtering as well as proxy services, NAT, and intrusion detection.
Answer:
Internet Security & Acceleration Server (ISA)
Explanation:
Fill in the blanksMicrosoft Internet Security & Acceleration Server (ISA) is a complex, full-featured firewall that includes stateful packet filtering as well as proxy services, NAT, and intrusion detection.
A series of projects that are organized in such a way that each project utilizes people from different functional areas is using which of the following organizational structures? Cross-functional flexible team Matrix project Pure project Functional project Integrated Task Force
Answer:
Matrix Organizational Structure
Explanation:
Matrix Organisational structure uses a combination of two or more types of organizational structures. It is a structure in which an organization uses cross-functional teams comprised of personnel from various disciplines in support of a common project. With this form of organisational structures, usually, there are two chains of command, where project team members have two bosses or managers. This structure though complex, helps in achieving the ultimate goal of a company using it. This type of structure is mainly used in organisations which have diverse product lines and services.
Nielsen purchases scanner data from retail transactions to track the sales of consumer packaged goods, gathered at the point of sale in retail stores of all types and sizes. Scanner data is an example of:
Answer: syndicated external data.
Explanation: This brings us to the definition of syndicated data :-
Syndicated data refers to general market data that is not specific to any particular client, rather a compilation of retailer and product data, syndicated data is generally collected by market research firms and then bought by businesses who have developed interest in the market.
A few employees at Develetech require file transfer capability to upload new code snippets and documentation to staging areas. Having this requirement means that access will have to be granted to secure areas on the network. Because of the sensitivity of the information and the systems to be accessed, which protocol should the security team insist on for this privilege to be secure
Answer:
File Transfer Protocol over SSL.
Explanation:
The certain Develetech employees need data sharing ability to submit the latest pieces of program and documents to the staging locations. Getting that provision implies connections to protected locations on a server will need to be authorized.
Due to some kind of responsiveness of that same data but that's to get accessed systems. Their support group would focus on file transfer protocol over SSL protocol for such an opportunity to be protected.
The computer program that Josh is working on presents him with a sentence in which a word has been underlined. Josh has to indicate the part of speech represented by the underlined word. After receiving feedback about the correctness of his response, Josh is given another sentence with an underlined word. This description best illustrates what type of computer-based instruction (CBI) program?
Answer:
Drill and practice.
Explanation:
That system program for which Josh works provides himself with such a sentence stressing a phrase. He must signify that portion of speech described by that of the term that has been emphasized.
He being provided a further statement with such an underlined term while getting suggestions regarding the current consistency for his answer This definition is the best demonstration of CBI system Drill and practice.
What does it mean for a wireless network to be operating in "infrastructure mode"? If the network is not in infrastructure mode, what mode of operation is it in, and what is the difference between that mode of operation and infrastructure mode?
Answer and Explanation:
Within the following operating mode, most of the wireless controller remains linked through the main point (access point) for that broader server. The server runs within ad-hoc modes when this does not run under the following mode. Wireless servers wouldn't have the connectivity to interact within ad-hoc mode.
So, the following statement is correct according to the given scenario of the following mode.
Of the measures of feasibility in the accompanying figure, ____ considers points such as "Does the proposed platform have sufficient capacity for future needs?" and "Will the hardware and software environment be reliable?"
a. schedule feasibility
b. technical feasibility
c. economic feasibility
d. operational feasibility
Answer:b. technical feasibility
Explanation: Technical feasibility is an important tool for both troubleshooting and maintenance,it is the process through which an expert evaluates a process or a product in order to determine what can either be achieved or to the extent to which a certain action will lead to a tangible result.
Technical Feasibility is one of the most important factor when making decisions on the use of materials or equipments in a particular environment or condition.
What is advanced analytics? Select one: a. A collection of large, complex data sets, including structured and unstructured data, which can't be analyzed using traditional database methods and tools b. Processes and manages algorithms across many machines in a computing environment c. Focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization d. Extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on Big Data to identify trends, market changes, and other relevant information
Answer:
C. Focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization.
Explanation:
Imagine you have a business that has been doing so well and you are able to predict your best selling product for the next few years to come. That I believe is an awesome thing to do with the help of tools like advanced analytics. Advanced analytics is a way businesses examine data to derive new insights and then make informed decisions according to these informed decisions. In this digital age, with the right knowledge and expertise, we can help decipher and make sense of data clutter. Advanced analytics starts off by mining data that the businesses generate for analysis. For instance, if you know what your customer’s preferences and purchase behaviors are, you can predict which product will sell out fast.
Final answer:
Advanced analytics encompasses a set of techniques designed to gain insights and predict future trends by analyzing Big Data, using methods such as statistical algorithms, predictive models, and data mining. It goes beyond traditional analysis by focusing on prediction and utilizing various statistical tools. The impact of advanced analytics is wide-ranging, revolutionizing fields such as political science.
Explanation:
Advanced analytics refers to a set of techniques that are designed to model internal and external data to gain valuable insights and predict future trends. Unlike traditional data analysis, which may focus only on explaining past events, advanced analytics dives deeper into data, especially Big Data, to provide a predictive outlook on future events or trends. It employs sophisticated methods such as statistical algorithms, predictive models, machine learning techniques, and what is known as data mining.
Big Data is vast in volume and includes structured, semi-structured, and unstructured data from different sources. The analysis goes beyond simple data aggregation; it involves inspecting, cleaning, transforming, and modeling data to discover useful information. Advanced analytics uses quantitative methods extensively, which is evident in practices such as regression analyses and applying multi-variate statistical techniques to discern patterns within large datasets.
Moreover, tools like SPSS, Stata, R, and Python facilitate the analysis of Big Data. The impact of Big Data and advanced analytics extends across different fields, revolutionizing the way we understand and utilize data. Particularly in political science, these waves of advanced analytics and machine learning are profoundly influencing the analysis of extensive political data.
Which collaboration technology is becoming more and more popular within organizations because it provides a means for forming ad hoc groups, networking and locating potential business allies?
a) Intranet
b) Wikis
c) VoIP
d) Social networking sites
e) Unified communications
Answer:
d) Social networking sites
Explanation:
-Intranet is a network that is created by an organization to share information, tools and different services inside the company.
-Wikis are websites used to share content and knowledge and different users can modify the information.
-VoIP is a technology that allows you to make calls over the internet.
-Social networking sites are online platforms that allow people to connect with organizations and other people, create communities online and share different types of information.
-Unified communications is a system that has different communication methods through a single application.
According to this, the collaboration technology that is becoming more and more popular within organizations because it provides a means for forming ad hoc groups, networking and locating potential business allies is social networking sites.
You have a server with Windows Server 2012 R2 installed on Disk 0, a basic disk. You use the server to store users' documents. You have two more disks that you can install in the server. What should you do if you want to provide fault tolerance for users' documents
Answer:
Create a RAID 1 volume from Disk 1 and Disk 2.
Explanation:
To provide fault tolerance for users' documents we should create a RAID 1 volume from Disk 1 and Disk 2.
After class, Anita and Bev make plans to study for their psychology exam together but cannot decide on a time or location. In addition, Anita realizes that she left her phone in her apartment. Anita and Bev change their mind and agree that it is easiest simply to meet at Bev's dorm. Bev gives Anita her room number and passcode. Anita likely will be able to retain this information in short-term memory, without additional processing, for:_________.a. a second or lessb. 30 seconds or lessc. about two minutesd. a maximum of five minutes
Answer:
Option B; 30 SECONDS OR LESS.
Explanation:
Short-term memory, also known as primary or active memory, is the information we are currently aware of or thinking about.
When short-term memories are not rehearsed or actively maintained, they last mere seconds.
Most of the information kept in short-term memory will be stored for less than 30 seconds (approximately 20 to 30 seconds), but it can be just seconds if rehearsal or active maintenance of the information is not done.
Therefore, Anita likely will be able to retain the information in short-term memory, without additional processing, for 30 SECONDS OR LESS.
Which of the following is not one of the Generally Accepted Recordkeeping Principles ("The Principles®")? a. Accountability b. Storage c. Retention d. Protection
Answer:
b. Storage
Explanation:
The Generally Accepted Record keeping Principles are a guideline that has been created for managing records in such a way that it supports the firm's immediate and future regulatory, legal, risk mitigation, environmental and operational requirements. There are 8 different principles in this guideline and those are the principle of Accountability , Transparency, Integrity, Protection, Compliance, Availability, Retention, and Disposition. Therefore the one answer that is not a principle is Storage.
Write a statement that declares a PrintWriter reference variable named output and initializes it to a reference to a newly created PrintWriter object associated with a file named "output.txt".
Answer:
PrintWriter variable = new PrintWriter("output.txt");
Explanation:
There are two ways of declaring a reference variable in programming.
One way is
Reference Variable-name = new Reference ("some texts here");
While the other is
Reference Variable-name;
Variable-name = new Reference ("some texts here");
Both ways are valid ways of reference variable declaration.
In the question above, the reference is PrintWriter, it points to output.txt and the question says "write a single statement";
Hence, we make use of
PrintWriter variable = new PrintWriter("output.txt");
A reference variable is declared to be of a specific type and that type can never be changed.
The next generation of 3-D video will be based on _____ technology, where a viewer will be able to get different views of the scene by moving her head or walking around the display. This will involve dynamic depth cues that result from the viewer’s own motion, not just from the motion of objects in the scene.
Answer:
Virtual Reality Technology
Explanation:
Virtual reality is a simulation based computer technology which imitates the real world and provides real life like experience. One of the key applications of virtual reality is 3D video games where users use VR headsets and get immersed into the world of simulated reality. VR technology also incorporates sensory inputs from the user, their physical movement gets translated in real time and they can move around and interact with various features. They can also sense dynamic depth which provides a real world experience.
You work as the IT administrator for a small corporate network. One of the company employees needs to add an additional PCI card to the motherboard. When you open the computer, you see that the card purchased will not fit due to the card's height.
The question involves a compatibility issue with a PCI card's installation in a small corporate network's computer system. It requires an understanding of the technical specifications and form factors of both the motherboard and the PCI card to resolve the problem.
Explanation:The subject of the question pertains to installing additional hardware in a computer, specifically within the context of Computers and Technology. The scenario at hand deals with a physical compatibility issue between a PCI card and the available space on the motherboard concerning the card's height. It is important to recognize that there are different sizes of PCI cards, including standard and low-profile cards, and they must match the specifications of the available slots to ensure a proper fit. This might require purchasing a different type of PCI card or utilizing a different slot that accommodates the card's dimensions.
Your networking card is crucial for connecting your system to a network but encountering a compatibility issue requires quick problem-solving to maintain productivity in a corporate environment. The key to resolving this issue lies in understanding the technical specifications of the motherboard and the PCI card, and then taking appropriate action either by exchanging the card for one with the correct form factor or modifying the arrangements inside the case if possible and if not against company policy.
You place a new disc in an optical drive, and then double-click the drive in the operating system's file browser interface. An error message appears stating that the drive is not accessible. What should you do
Answer:
Wait. Then you try it again
Explanation:
You wait and try again later and if this still persists, you may have to check the optical drive from the drive manager peradventure there is an issue there probably a software issue, also you may have to clean the optical drive using the cleaner disc, likewise you may need to test an old disc on the optical drive to be sure the fault is not from the disc you inserted.
Given a string, return a new string made of 3 copies of the last 2 chars of the original string. The string length will be at least 2. extra_end('Hello') → 'lololo' extra_end('ab') → 'ababab' extra_end('Hi') → 'HiHiHi'
Answer:
def extra_end(str):
return 3*(str[-2:])
Explanation:
When sending the right email, there are three key things you’ll need to understand: why you are sending that email, your goal, and the value you’re delivering to the person on the other end of the send. This gives you the foundation to __________.
Answer:
Explanation:
the required expectations with the receiver by setting an
appropriate and contextual goal and then aligning it with information that will
provide the most value
Suppose the beta of Microsoft is 1.13, the risk-free rate is 3 percent, and the market risk premium is 8 percent. Calculate the expected return for Microsoft.
Answer:
8.65%
Explanation:
Rj = Rf + risk premium.
Rj = Rf + β[E(RM − Rf)].
= 3 + 1.13 (8 - 3)
= 3 + 1.13 x 5
= 3 + 5.65
= 8.65 percent
This relationship between risk and expected return is called the security market line.
The expected return for Microsoft, using CAPM and the given risk-free rate, beta, and market risk premium, is 12.04 percent.
To calculate the expected return for Microsoft, given that the beta of Microsoft is 1.13, the risk-free rate is 3 percent, and the market risk premium is 8 percent, we can use the Capital Asset Pricing Model (CAPM). The CAPM formula is:
Expected Return = Risk-Free Rate + (Beta Times Market Risk Premium)
Plugging in the given values:
Expected Return = 3% + (1.13 Times 8%)
Expected Return = 3% + 9.04%
Expected Return = 12.04%%
Therefore, the expected return for Microsoft is 12.04% percent.
In 4-6 sentences, describe a career in the graphic and web design field that best interests you.
What about it is appealing?
What would be the hardest part of the career?
Would you recommend it to others?
Why or why not?
A career in the graphic and web design field which best interests me is multimedia design.
Explanation:
What about it is appealing?
A multimedia designer uses art, sound, and design skills to create videos, audio, and animated images. They produce sketches, plans, scale models, or drawings. Multimedia designers are responsible for designing props, sets, and costumes, directing set assistants on design interpretations, and advising on other areas of technical production such as lighting and sound to ensure the production set closely resembles their designs. The job of the multimedia designer requires imagination and creativity combined with technical expertise in applying a wide range of software applications.What would be the hardest part of the career?
When creating something for others (especially those that are very vague about what they want or have no clue what they'd like you to create) it's a whole different story. To create something for another person requires you to get into their head.To create something that they'd want and I'm not great at that. And then there's that whole business about people commenting your artwork, or the thing that you created for themWhat would be the hardest part of the career? Why or why not?
Yes, I would recommend it to others. Multimedia designers are the creative minds behind advertisements, informational videos, and many other types of content you come across online or while watching television. They combine text, audio, animation, photography, and video to create informational and impactful content.In any *NIX system, after saving a script named "script_name," you need to make it executable so that you can run it. Which command will accomplish this task from the command line?
Answer/Explanation:
chmod +x script_name
Cheers