Answer:
bmi = 703 * weight / height ** 2
bmi = (703 * weight) / height ** 2
bmi = 703 * weight / (height * height)
Explanation:
just took this on edge. have a good one
Jackson has been working as a sales manager at a large company for 8 months and oversees about 100 sales representatives. For the most part, Jackson does a good job of motivating his employees and overall team sales have remained consistent. However, Jackson has a particularly dominating management style. He tends to micro-manage and tells even the most successful sales reps with 20+ years of experience how they should be doing their jobs. He has called out several sales reps in a meeting and put them on the spot to justify their sales techniques. Jackson does not respond very well to criticism from other people.
a.Thoroughly analyze why the conflict has occurred.
b.Identify and explain how this conflict can be viewed and resolved from the point of view of one of Jackson’s employees.
c.Identify and explain how this conflict can be viewed and resolved from the point of view of one of Jackson’s managers.
Answer:
a. The conflict in this situation has occurred because of Jackson's dominating management style. He tends to micro-manage and control every aspect of his employees' work. This type of management style can be demotivating and may lead to conflicts between the manager and employees. Additionally, Jackson's tendency to call out sales reps in meetings and put them on the spot can make them feel embarrassed and demoralized.
b. From the point of view of one of Jackson's employees, the conflict can be viewed as a result of Jackson's lack of trust in his employees. They may feel that Jackson does not have faith in their abilities and that he is overly critical of their work. To resolve this conflict, Jackson should start delegating more responsibilities to his employees and trust them to make decisions and work independently. He should also recognize and appreciate their successes, rather than just focusing on their mistakes.
c. From the point of view of one of Jackson's managers, the conflict can be viewed as a result of his management style. Jackson's micro-managing approach may lead to inefficiencies and delays in decision-making, as employees may feel that they cannot make decisions without his approval. To resolve this conflict, Jackson's managers should provide him with feedback on his management style and encourage him to delegate more responsibilities to his employees. They should also provide him with training on how to manage employees effectively and how to give feedback in a constructive and respectful manner.
Explanation:
With what software tool can you see the applications.
Answer:
Microsoft Windows Task Manager
Explanation:
salamat po
Which type of operating system is usually used in personal computers?
А _____operating system is usually used in personal computers. This allows
_______ to perform multiple
tasks simultaneously.
Number 1:
Multi-user/multitasking
Single-user/multitasking
Single-user/single-tasking
Number 2:
Two user
A user
Multiple users
Answer
1st one is :multi-user/multi-tasking
2nd one is:two users
Explanation:
multi-user/multi-tasking
two users
write a program that prompts the user for a number from 1 to 50 until the number 13 is encountered. not including the 13, calculate the maximum value.
The maximum value is calculated using the following program in which a program that prompts the user for a number from 1 to 50 until the number 13 is encountered.
You have to use while loop for the given problem.
Wat is While Loop?
While the test expression (condition) is true, a block of code is iterated over in a while loop in Programming Language.
When we are unsure of how many times to iterate, we typically use this loop.
Syntax of while Loop in Programming Language:
while test_expression:
Body of while
Step-by-step Coding Program:
inp=0
count = 0
sum=0
while inp!=13 :
inp= int(input("Please enter an odd number from 1 to 50(19 to stop): "))
print(inp)
if inp!=13:
sum=sum+inp
count+=1
print("the average is ",sum/count)
To learn more about While Loop, visit: https://brainly.com/question/19344465
#SPJ4
Sasha is designing a web page and she wants to ensure that it will display well on different types of devices, such as tablets, smart phones, and computer monitors.
1. What units of measurement can Sasha use to help the webpage display more easily on multiple devices? Why?
Sasha can use relative units of measurement, such as percentages and ems, to help the webpage display more easily on multiple devices.
What is webpage?Webpage is like a page in a book, but it is available online and accessible through the internet. It is a collection of information and media, like text, images, videos, and other content, which is formatted in HTML and displayed in a web browser. Webpages are linked to other pages through hyperlinks, allowing users to navigate from one page to another. Webpages can be static or dynamic, meaning they can be updated regularly, or they can remain the same over time.
This is because percentages and ems are based on the size of the device’s display, making the page more scalable and responsive to the device’s size.
To learn more about webpage
https://brainly.com/question/28431103
#SPJ1
What is telnet?
A. internet protocol that allows one to access newsgroups
B. internet protocol that is the foundation for online data communication
C. internet protocol that connects to a computer remotely
D. internet protocol that loads a local file from a network onto a computer
Answer: C. internet protocol that connects to a computer remotely
Explanation:
Telnet is an internet protocol that connects to a computer remotely. Thus, the correct option for this question is C.
What do you mean by Internet Protocol?Internet protocol may be defined as the methodology or protocol through which data is efficiently sent from one computer to another over the internet. It depends on the datagrams across network boundaries.
Each computer in this process is known as a Host. It has some special characteristics that facilitate its mechanism of working efficiently according to the requirement. Telnet protocol effectively provides a standard methodology and approach for terminal devices and terminal-oriented processes to the interface.
Therefore, telnet is an internet protocol that connects to a computer remotely. Thus, the correct option for this question is C.
To learn more about Internet protocol, refer to the link:
https://brainly.com/question/17820678
#SPJ2
Wiliam would like to sort a list of items after the data is already entered
Which method is NOT an available sort option?
number
date
text
symbol
Answer symbol
Explanation:
What is a new ransomware program that encrypts your personal files and demands payment for the files’ decryption keys?
A new ransomware program, called "LockBit" has recently been discovered. This malicious software encrypts personal files on a computer, then demands payment in the form of cryptocurrency in order to decrypt the files. It is important to note that there is currently no known way to decrypt the files without paying the ransom.
LockBit is capable of infiltrating a computer system via malicious emails, spam, or drive-by downloads. Once on a system, the ransomware will begin to search for files to encrypt. After the encryption process is complete, a ransom note will be displayed on the computer's screen with instructions on how to pay the ransom.
To avoid becoming a victim of LockBit, it is important to always ensure that your computer is up-to-date and protected with a reputable antivirus and anti-malware software. Additionally, never click on links or open attachments from emails from unknown or untrustworthy sources.
For such more questions on ransomware program:
brainly.com/question/27312662
#SPJ11
In a ________ system configuration, separate information systems are designed and managed by each foreign unit.
Answer:
In a decentralized system configuration, separate information systems are designed and managed by each foreign unit.
Explanation:
hopes this help (:
low frequency radio wave travel in straight line and high frequency radio wave can travel in all direction true or false
Answer:
The correct answer is True.
Explanation:
The electromagnetic spectrum consists of various waves. The Radio waves are categorized to be at the low-frequency end of this spectrum.
Radio Waves have multiple communication uses. Some of them are television and radio broadcasting, communications, and satellite transmissions.
Radio waves are not harmful to biotic life when absorbed by living matter and their transmission is unimpeded by air. Their transmission can also be absorbed, deflected, reflected, refracted, or diffracted by air molecules and the earth's surface.
Cheers
la révolution industrielle rédaction
The Industrial Revolution began in the 18th century in Great Britain. It was only the first stepping-stone to the modern economic growth that is still growing to this day. With this new bustling economic power force Britain was able to become one of the strongest nations. While the nation was changing so was the way that literature was written. The Industrial Revolution led to a variety of new social concerns such as politics and economic issues. With the shift away from nature toward this new mechanical world there came a need to remind the people of the natural world. This is where Romanticism came into play; it was a way to bring back the urban society that was slowly disappearing into cities.
The Agricultural Revolution: Between 1750 and 1900 Europe’s population was dramatically increasing, so it became necessary to change the way that food was being produced, in order to make way for this change. The Enclosure Movement and the Norfolk Crop Rotation were instilled before the Industrial Revolution; they were both involved in the separation of land, and the latter dealt more with developing different sections to plant different crops in order to reduce the draining of the land. The fact that more land was being used and there weren’t enough workers it became necessary to create power-driven machines to replace manual labor.
Socioeconomic changes: Prior to the Industrial Revolution, the European economy was based on agriculture. From the aristocrats to the farmers, they were linked by land and crops. The wealthy landowners would rent land to the farmers who would in turn grow and sell crops. This exchange was an enormous part of how the economy ran. With the changes that came with the Industrial revolution, people began leaving their farms and working in the cities. The new technologies forced people into the factories and a capitalistic sense of living began. The revolution moved economic power away from the aristocratic population and into the bourgeoisie (the middle class).
The working conditions in the factories during the Industrial Revolution were unsafe, unsanitary and inhumane. The workers, men, women, and children alike, spent endless hours in the factories working. The average hours of the work day were between 12 and 14, but this was never set in stone. In “Chapters in the Life of a Dundee Factory Boy”, Frank Forrest said about the hours “In reality there were no regular hours, masters and managers did with us as they liked. The clocks in the factories were often put forward in the morning and back at night. Though this was known amongst the hands, we were afraid to speak, and a workman then was afraid to carry a watch” (Forrest, 1950). The factory owners were in charge of feeding their workers, and this was not a priority to them. Workers were often forced to eat while working, and dust and dirt contaminated their food. The workers ate oat cakes for breakfast and dinner. They were rarely given anything else, despite the long hours. Although the food was often unfit for consumption, the workers ate it due to severe hunger.
During this time of economic change and population increase, the controversial issue of child labor came to industrial Britain. The mass of children, however, were not always treated as working slaves, but they were actually separated into two groups. The factories consisted of the “free labor children” and the “parish apprentice children.” The former being those children whose lives were more or less in the hands of their parents; they lived at home, but they worked in the factories during the days because they had to. It was work or die of starvation in this case, and their families counted on them to earn money. Fortunately these children weren’t subjected to extremely harsh working conditions because their parents had some say in the matter. Children who fell into the “parish apprentice” group were not as lucky; this group mainly consisted of orphans or children without families who could sufficiently care for them. Therefore, they fell into the hands of government officials, so at that point their lives as young children turned into those of slaves or victims with no one or nothing to stand up for them. So what was it exactly that ended this horror? Investments in machinery soon led to an increase in wages for adults, making it possible for child labor to end, along with some of the poverty that existed. The way that the Industrial Revolution occurred may have caused some controversial issues, but the boost in Britain’s economy certainly led toward the country becoming such a powerful nation.
What is Current interrupt register
Answer: An interrupt control register, or ICR, is a hardware register in a computer chip used to configure the chip to generate interrupts—to raise a signal on an interrupt line—in response to some event occurring within the chip or a circuit connected to the chip.
Explanation:
They removed my other post but I didn't learn my lesson :)
Unblocked web proxy services:
Latest(dot)cf
If that doesn't work then go to
securly(dot)fail
the dot=. So uhm yea. Wont let me put links but its ok :) hope this helps you.
(Games directory is currently down, working on the rammerhead proxy)
Answer:
thank you so much I'm so bored in class
Explanation:
In C++, the names of the corresponding formal and actual parameters (the parameter names in the function heading and the function call) must be the same. True or False
The parameter names in the function heading and the function call, or the corresponding formal and real parameters, must match exactly in C++ is not true.
Describe the formal parameter .
A variable which you specify when choosing the subroutine or method is referred to as a formal parameter. The list of potential variables, their locations, and their information types are determined by these parameters. These are variables or phrases that are mentioned in a subprogram specification's parameter list. It is necessary to define the type of data of the receiving value. When used in the skin contains, formal arguments can be thought of as instance variables of the function.
To know more about formal parameters
https://brainly.com/question/15008938
#SPJ4
How is 69.50% is a C when 69% is a D?
Answer:
below
Explanation:
69.5% is probably the minimum amount needed to get a C while anything below that to a certain extent is a D. For example, a 59.5% - 69.49% might be a D.
Anyway, 69% is lower than 69%, so it make sense why it would be a D
when reliable transport such as tcp is used which lower layer must also provide completly relieble end to end service?
When it comes to reliable transport, TCP (Transmission Control Protocol) is often the go-to choice. However, there is a lower layer that must also provide completely reliable end-to-end service in order for the overall transmission to be successful.
The lower layer in question is the network layer, which is responsible for routing data packets between different networks. In order for end-to-end reliability to be achieved, the network layer must ensure that packets are delivered without error and in the correct order. This is typically done through the use of protocols such as IP (Internet Protocol) and ICMP (Internet Control Message Protocol).
In summary, when using a reliable transport such as TCP, the network layer must also provide completely reliable end-to-end service. This is achieved through the use of protocols that ensure packets are delivered without error and in the correct order, allowing for successful transmission of data across different networks.
To learn more about TCP, visit:
https://brainly.com/question/27975075
#SPJ11
15
In the formula, =A5 - SD$26, SD525 is best bestbed as a
(1 Point)
absolute erence
function
eie eerence
Answer:
hi
Explanation:
what should you consider when using a wireless keyboard with your home computer cyber awareness
A good practice is to protect data on your home wireless systems. What one should you consider when using a wireless keyboard with your home computer is Reviewing and configuring the available security features, including encryption.
An individual need to protect their information when using wireless technology. It can be done through avoiding the use of non-Bluetooth-paired or unencrypted wireless computer peripherals.The kind of information sometimes cause serious damage to national security in the event of unauthorized disclosure.
Learn more from
https://brainly.com/question/25349554
why does a customer call a support a gent about an internet service issue?
A customer may call a support agent about an internet service issue because they are experiencing problems with their internet connection.
Customers often reach out to support representatives when they encounter issues with their internet service. These issues could range from slow connection speeds, to frequent disconnections, or difficulties with internet-connected devices. Additionally, customers may have inquiries about their billing or seek help with troubleshooting. The support representative serves as a helpful resource, providing solutions to address these problems and answering any questions the customer may have. They are trained to effectively diagnose the issue and offer a resolution in a timely manner. By contacting a support representative, customers can receive the assistance they need to resolve their internet service issues.
To learn more about internet, click below:
https://brainly.com/question/2780939
#SPJ4
An important part of the development of transport is safety. how can you, when you get around in different ways, contribute to making it safer on the roads
Answer:
I need help I don't get a this questions please asap?
Explanation: Head-on collisions. Some simple solutions can help to reduce the risk of head-on crashes. ...
Run-off road crashes. This is when a vehicle collides with a stationary object, such as a sign or lamppost, after leaving the road. ...
Intersection crashes. ...
Vulnerable road users. ...
Much work to be done.
Aug 31, 2018
Leslie has been organizing her data by filtering by date. She notices that she has done this before in previous experiences. After she sets up her filters, she should click on
Save Database As.
Save Document.
Save Object As.
Save Query.
Leslie's experience with filtering data by date in the past is likely why she recognizes the importance of saving her filtered results for future use. When she sets up filters to organize her data, she is essentially creating a query.
When Leslie sets up filters to organize her data by date, she is essentially creating a query. A query is a specific request for data from a database that meets certain criteria, such as filtering by date. Therefore, after setting up her filters, Leslie should click on "Save Query" to save her query for future use. This will allow her to easily access the same filtered data again in the future without having to set up the filters from scratch.
Since Leslie is organizing her data by filtering by date, she is most likely working with queries in a database management system. Saving her work as a query allows her to easily apply the same filters in the future. When working with databases, it is common to use queries to filter and sort data. After setting up the filters, Leslie should save her work as a query to preserve the filtering settings. This will enable her to use the same filters in future instances without having to reconfigure them each time. So, she should click on "Save Query" after setting up her filters.
To know more about data visit:
https://brainly.com/question/13650923
#SPJ11
Images, symbols, and diagrams are types of
art objects
Graphs
graphics
presentation objects
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is :
Graphics
Because Graphics are the visual representation of information without text. Images, symbols, and diagrams are types of graphics. These graphics can be used in presentations to present information visually.
While other options are not correct because:
Art objects are some images or painting that is the artistic creation of aesthetic value. While graphs are the visual presentation of data and there are different presentation objects in PowerPoint such as images, symbols, text, and diagrams, etc. But it is noted that images, symbols, and diagram are not types of presentation objects but it is a type of graphics elements/objects.
T/F. the only valid procedures are the prewritten procedures included in visual studio 2012
False. The statement is not true. While Visual Studio 2012 may include prewritten procedures, it does not limit the validity of procedures to only those included in the software.
Valid procedures can be created by developers themselves or obtained from external sources. Visual Studio is a powerful development environment that allows developers to write their own procedures and integrate them into their projects. Additionally, developers can leverage various libraries, frameworks, and code repositories to find and incorporate valid procedures written by others. The validity of a procedure is determined by its correctness, functionality, and adherence to programming principles, rather than being limited to the prewritten procedures included in a specific software version.
Learn more about software version here:
https://brainly.com/question/30632785
#SPJ11
List two forms of personal information that will need to be provided when purchasing something online?
Answer:
You can divide primary data into two categories: quantitative and qualitative.
Explanation:
Hope this helps
for the following assembly program, if the content of d[9] is 3. what is the value in r5 and r6 after the program completes?
For the following assembly program, assuming that the content of D[9] is 2, the value in R5 and R6 after the program completes will be 3 and 2 respectively.
What is the explanation for the above?The program starts by moving the value 1 into R6 and moving the value 9 into R5. Then it jumps to the label label1 if R5 is equal to 0. Since R5 is not equal to 0, it does not jump to the label and instead adds the values in R5 and R6, which are 9 and 1 respectively, to produce the value 10 in R5.
Next, the program adds the values in R5 and R6 again, producing the value 11 in R5. Finally, it subtracts the value in R6 from the value in R5, which is 11 and 1 respectively, to produce the value 10 in R6. Therefore, at the end of the program, R5 has a value of 3 and R6 has a value of 2.
Learn more about the assembly program:
brainly.com/question/14190352?
#SPJ1
Full Question:
For the following assembly program, assuming that the content of D[9] i s 2. What is the value in R5 and R6 after the program completes? MOV R6, #1 MOV R5, 9 JMPZ R5, label1 ADD R5, R5, R6 label1: ADD R5, R5, R6 SUB R6, R5, R6
Explain the four misconceptions about entrepreneurship.
Answer:
that is the answer
Explanation:
ok its about succes you business
protected members of a base class are like _, but they may be accessed by derived classes.
The protected members of a base class are like private members but they may be accessed by derived classes.
What is protected members and private members?Member in base class in programming language such as C++ can deny access from the other function or class with the statement protected members or private members.
So, by using protected member or private member in the base class, the other code can't access their value. But only the other member in the same base class can access their value.
The different between protected member and private member is the private member will deny all access except the other member in same base class meanwhile the protected member will give access too for derived class.
So, basically the protected member is like private members except the protected member will give access to derived class.
Learn more about private member here:
brainly.com/question/15078332
#SPJ4
What is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission?
Answer:
The answer is "Spyware".
Explanation:
Spyware is a supplementary program that is mounted on your customer computer and it transmits the data without authorization via the Internet. Its business includes ads, private data, and improvements in the user interface, which is why it has become recognized as the special adware class that collects and transmits user information over the web without the user's permission.
Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bag_ounces followed by "seconds". End with a newline. Remember that print() automatically adds a newline.
Answer:
In Python:
def print_popcorn_time(bag_ounces):
if bag_ounces < 3:
print("Too small")
if bag_ounces > 10:
print("Too large")
else:
print(str(6 * bag_ounces)+" seconds")
Explanation:
This defines the function
def print_popcorn_time(bag_ounces):
This checks if bag_ounces < 3
if bag_ounces < 3:
If yes, it prints too small
print("Too small")
This checks if bag_ounces > 10
if bag_ounces > 10:
If yes, it prints too big
print("Too large")
If otherwise,
else:
Multiply bag_ounces by 6 and print the outcome
print(str(6 * bag_ounces)+" seconds")
Answer:
Explanation:
def print_popcorn_time(bag_ounces):
if bag_ounces < 3:
print("Too small")
elif bag_ounces > 10:
# Use of 'if' for this portion, will only yield a test aborted for secondary tests
print("Too large")
else:
print(str(6 * bag_ounces)+" seconds")
user_ounces = int(input())
print_popcorn_time(user_ounces)
JAVA
Write a method that makes the input string of sentences ending with '.' and combines them into a single sentence. The result should keep the final period.
For example,
runOnSentence("A sentence. That runs on.")
returns
"A sentence that runs on."