which of the following will not be considered in improved business performance planning ? A. bussines profitability B.. Ignoring new idea c. efficient resourse utilization D. bussiness risk management

Answers

Answer 1

Among the following option B. Ignoring new idea will not be considered in improved performance planning.

What is buisiness performance planning?

Performance planning is the term used to describe a company's systematic process for determining and preparing an individual's or organization's goals, as well as the most effective means of achieving them. Both the company and the employee participate in the planning process through a formal plan called the development plan.

A company must successfully utilize new ideas in order to advance its operations, introduce fresh goods and services to the market, boost productivity, and, most significantly, raise profits.

So, new ideas must not be ignored .

Learn more about buisiness performance planning here https://brainly.com/question/25922327

#SPJ10

Answer 2

Answer:

Among the following option B. Ignoring new idea will not be considered in improved performance planning.

Explanation:


Related Questions

What is CPU? List its major parts.​

Answers

Answer:

The central processing unit is the brain of the computer. it is the part of the computer which performs manipulations. it is also called the microprocessor.

components of the CPU: The control unit, the arithmetic and logic unit, the register and the memory unit.

I hope you understand:-):-)

write an algorithm to find the area of a circle of radius r

Answers

Answer:

e=mc^2

Explanation:

What is the process of ensuring that corporate security policies are carried out
consistently?

Answers

Policy or security and only conscious

Ensuring consistent adherence to corporate security policies involves a systematic approach to implementation and monitoring.

Ask about the process of ensuring that corporate security policies are carried out consistently.

Here are some steps that can be taken to ensure policies are carried out consistently:

1. Policy Development:

Establish clear and comprehensive security policies that cover various aspects such as data protection, access controls, network security, and employee guidelines.

2. Communication and Training:

Effectively communicate the policies to all employees, ensuring they understand their roles and responsibilities in maintaining security.

3. Documentation and Accessibility:

Document the policies in an easily accessible format, such as an employee handbook or an intranet portal. Regularly update and maintain the documentation to reflect any changes or new requirements.

4. Compliance Monitoring:

Implement a monitoring system to track compliance with security policies. This can include conducting internal audits, vulnerability assessments, and security awareness campaigns.

5. Incident Response and Reporting:

Establish a clear process for reporting security incidents or violations. Encourage employees to report any suspicious activity promptly.

To learn more about the security policies visit:

https://brainly.com/question/13169523

#SPJ3

Q3: What do you mean by a pointer to a pointer? Can this be extended?

Answers

Answer:

hola, te habla mi contestadora si no te contesto seguro no quiero hablar con vos

donde vas si son las 11?

todo el barrio la conoce

Explanation:

le gusta sentirse mala, tiene un tubo en la Sala

para tumbar el club

kiere quedarse dentro del party

será cuestión de tiempo?

conosco tu debilidad

Identify the cost of non-compliance. What will happen to the organization if they fail to meet compliance?

Answers

The costs of non-compliance are:

FinespenaltiesBusiness disruption.Revenue loss.Productivity loss.

What will happen to a firm is non-compliance?

Non-compliance is one that makes a firm or company to loose millions of dollars in terms of  financial losses, there is also security breaches, license band, business disruptions, and others.

Therefore, The costs of non-compliance are:

FinespenaltiesBusiness disruption.Revenue loss.Productivity loss.

Learn more about  non-compliance from

https://brainly.com/question/17306620

#SPJ1

You are advising the owner of Smalltown Computer, a new, local computer repair store that also builds custom computers to order. What competitive strategies could Smalltown Computer exert? Which ones will it have difficulty exercising?

Answers

Answer:

speech processing is the study of speech signals and processing access signal the signals are used process in a digital representation suspicious processing can be recognised as a special case of digital signal processing light to speed signal

What is wrong with this case statement -> case (x > 2):
A. cases can't have a test condition
B. cases must be capitalized
C. cases must use a ; and not a :

Answers

Answer:

A: cases can't have a test condition

Explanation:

Under the hood, switch statements don't exist. During the mid-stage of compilation, a part of the compiler will lower the code into something that is easier to bind. This means that switch statements become a bunch of if statements.

A case in a switch statement acts upon the switch value. Think of the case keyword as the value you pass into the switch header:

int x = 10;

switch (x)

{

case (x > 2):

     // Code

     break;

}

// Becomes

if (x(x > 2))

{

// Code

}

// Instead do:

switch (x)

{

case > 2:

     // Code

     break;

}

// Becomes

if (x > 2)

{

// Code

}

Why is it important not to leave your personal information on a public computer?
A. Other people need a clean computer to use.
B. Someone can steal the information and hurt you.
C. It makes it hard for the next person to log in.
D. It's rude and someone else has to clean up after you

Answers

Answer:

B. Someone can steal the information and hurt you.

Explanation:

People can hack into your accounts using your informations and spread hurtful things that can make people hurt. The people will think that you posted this (even if you didn't) and blame you.

a ___ is a type of computer that is small and portable?

Answers

Answer:

laptop

Explanation:

laptops are small and they can be taken anywhere.

I have a .NET 6 basic website that I built using Entity Framework as the database for updating pages. I am ready to deploy the site/database to a live server somewhere, but I am looking for the best option.

The website is built using the latest .NET Framework 6.0, with Entity Framework 6.0.3. I know about HostGator, GoDaddy and InterServer.

I have read stuff online that said HostGator doesn't actually support the latest .NET 6.0, and GoDaddy only supports .NET Core 3.2?

HostGator is rougly $5.00 a month, GoDaddy is $6.00, and InterServer is $8.00.

I am leaning towards InterServer, because I have read that InterServer supports the latest .NET 6.0 and Entity Framework.

I am used to deploying to servers using LAMP stack, Linux, Apache, PHP, MySQL... The prices there are lower and it is fairly simple to setup. I figure there has to be something similar for windows and .NET.

For something similar, am I looking for Shared Hosting? Or VPS? I really don't understand what I need. I was hoping for Shared Hosting, export my SQL Server database, create it on the live server, then FTP my files over.

InterServer seems like it supports everything, so I am leaning towards that. I know no matter what, Windows Hosting is going to be a little bit more expensive. I just want something that I know is going to work with the latest .NET technologies.

Does anyone have any suggestions?

Answers

In the above scenario, i will recommend Bluehost  or InterServer since it is good and can meet your requirement.

What is Bluehost?

Bluehost is known to be a software that is said to be a little bit better than HostGator in the aspect of  security as it gives offer free SSL certificates, malware tools, and others.

Therefore, In the above scenario, I will recommend Bluehost  or InterServer since it is good and can meet your requirement.

Learn more about Bluehost from

https://brainly.com/question/17062016

#SPJ1

Select the items below that are a computer
Pocket Watch
Server
Calculator
Piano
Laptop
Tablet

Answers

Answer:

Laptop is the answer.. .....

Which for loop syntax is correct?
A. for {i=0, i<10, i++}
{code block}
B. for (i=0; i<10; i++);
{code block}
C. for (i=0; i<10; i++)
{code block}

Answers

Answer:

C

Explanation:

What is the optimal number of members for an Agile team?

Answers

5 or 6 people

Explanation:

Second, for those of you who demand a prefer an answer upfront, here it is – the optimal number of members for an agile team is 5 or 6 people. That is 5 or 6 team members and excludes roles like Scrum Master, Product Owner, and God forbid, Project Manager.

True or False?
With search advertising, you should have a landing page with long content (around 2,000 words).
HELPPPPP

Answers

The given statement is True.

What is Search Advertising?

Search Advertising is also known as search engine marketing which is an marketing technique used to place the advertisement in the search engine so that customers can review it.

The Companies who runs the business of the advertising in the search engine get a small amount of pay for such one click.

There is long content on the page of the websites containing the search advertising long with it. Therefore the statement given in the question is true.

Learn more about Search Advertising here:

https://brainly.com/question/8132328

#SPJ1

List and describe four services that comprise IT infrastructure, beyond physical devices and software applications.

Answers

The four services that comprise IT infrastructure are:

Telecommunications services. Data management services . Application software services.Physical facilities management services.

What does these services do?

Telecommunications services is known to help in terms of giving data, voice, and video network.

Data management services helps to save , manage, and analyze all data. Application software services helps to give firms-wide range capabilities.

The Physical facilities management services helps to make and handle physical installations of technology.

Therefore, The four services that comprise IT infrastructure are:

Telecommunications services. Data management services . Application software services.Physical facilities management services.

Learn more about  IT infrastructure from

https://brainly.com/question/869476

#SPJ1

Suppose that you have the following definitions:
struct time Type
struct tourType
{
int hr;
double min;
int sec;
string cityName;
int distance;
timeType travelTime;
};
};
a. Declare a variable destination of type tourType.
b. Write C++ statements to store the following data in destination: cityName - Chicago, distance -- 550
miles, travelTime - 9 hours and 30 minutes.
c. Write the definition of a function to output the data stored in a variable of type tourType.
d. Write the definition of a value-returning function tat inputs data into a variable of type tourType.
e. Write the definition of a void function with a reference parameter of type tourType to input data in a
variable of type to tourType

Answers

Suppose that you have the following definitions:struct time Type struct tourTypen the variable destination of type your type are tourType input(){cout<<"Enter the city, distance and time in hr and min"<>destination.city name;

What is C++ statements?

Expression statements. These statements examine an expression for its aspect outcomes or for its go-back value. Null statements. These statements may be supplied in which a declaration is needed with the aid of using the C++ syntax however in which no motion is to be taken.

#include#includethe use of namespace std;struct timeType;struct tourType;tourType destination;tourType input(){cout<<"Enter the city, distance and time in hr and min"<>destination.cityName;cin>>destination.distance;cin>>destination.travelTime.hr;cin>>destination.travelTime.min;go back destination;}void display()cityName;d.distance = t->distance;d.travelTime.hr = t->travelTime.hr;d.travelTime.min = t->travelTime.min;">int main().

Read more about the variable :

https://brainly.com/question/2804470

#SPJ1

Beth is a software developer who is focused on identifying early-stage interface problems. Beth addresses the dimension of usability known as __________.

Answers

The dimension of usability that is being addressed by Beth is known as efficiency.

The dimension of usability.

In Usability Engineering, there are five (5) qualities of a usable product suggested by Jakob Nielsen and these include the following:

LearnabilityMemorabilityEfficiencyErrors (low rate, easy to recover)Satisfaction

In this scenario, we can infer and logically deduce that the dimension of usability that is being addressed by Beth is known as efficiency because she's focused on identifying early-stage interface problems in software.

Read more on software here: brainly.com/question/26324021

#SPJ1

The network layer of the ISO/OSI model organize bits into ..........​

Answers

Answer:

frames

Explanation:

The data-link layer is the second layer from the bottom of the OSI Model. The data-link layer's principal role is to identify errors and merge data bits into frames.

SAfe is based on four primary bodies of knowledge#

Answers

SAfe is based on four primary bodies of knowledge that are Agile improvement, Lean product improvement, structures thinking, and DevOps.

What is the number one want for SAFe?

A number one purpose for SAFe is to align improvement to in addition commercial enterprise objectives. SAFe combines learnings from validated agile methodologies to create a platform that meets the necessities for software program improvement inside big organization programs.

SAFe Full Configuration includes 4 ranges: Team, Program, Large Solution and Portfolio. It is continuously being improved, and its ultra-modern model. Fe is primarily based totally on 4 number one our bodies of knowledge: Agile improvement, Lean product improvement, structures thinking, and DevOps.

Read more about the SAfe:

https://brainly.com/question/8430576

#SPJ1

To stay safe and avoid malware programs you should (choose 3)
a. run updates to your computers operating system
b. turn off your computer
c. install antivirus software and run regular updates and scans
d. click on any antivirus software ads that you see on the internet
d. avoid suspicious-looking ads or downloads when on the internet
f. install every virus software

Answers

Answer:

I would say choose,

A -  run updates to your computers operating system

C - install antivirus software and run regular updates and scans

D - avoid suspicious-looking ads or downloads when on the internet

What does an else statement do?
A. gives an alternative to the test conditions
B. always executes
C. nothing

Answers

Answer:

A

Explanation:

If the first condition are not true then it executes else, but if the first condition is true then it ignores the else statement

If you want to load the "my-data.csv" file to Dataframe so that you can explore find out the number of data items in the data set, how should you import the required library?

1.import numpy as dataframe

2.import pandas as pd

3.import seaborn as pd

4.import matplotlib.pyplot as pd​

Answers

If a person want to load the "my-data.csv" file to Dataframe one can use import pandas as pd.

What is pandas?

Pandas is known to be a tools that carry out data transformations. It often helps to filter and analyze any kind of data.

Note that for import one can use:

import numpy as np. import pandas as pd.

Therefore, If a person want to load the "my-data.csv" file to Dataframe one can use import pandas as pd.

Hence, the second(2) option is correct.

Learn more about Dataframe  from

https://brainly.com/question/25525005

#SPJ1

Question2.
What are the functions of information technology?

Answers

Answer:

I) infrastructure

ii) communication

iii) introduces and maintains computerized systems to process data efficiency , etc

Build python

Prompt the user for the length,width and height of a room.


Calculate the area of the floor. (length*width)


Calculate the volume of the room. (length*width*height)


Display the area and volume to the user.


Open a file named “roomdata.txt”.


Write the area and volume to the file.

Answers

Answer:

You'd have to create a "roomdata.txt" file before writing to it.

Explanation:

#Python Geometry

lenght = int(input("Enter lenght: "))

width = int(input("Enter width: "))

height = int(input("Enter height: "))

def floor_area(area);

area = 0

area = lenght * width

return area

def room_volume(vol);

vol = 0

vol = lenght * width * height

return vol

print ("Area of floor = ", floor_area, "/n Volume of room = ", room_volume)

f = open ("roomdata.text", "w")

f.write("Area of floor = ", floor_area, "/n Volume of room = ", room_volume)

f.close()

When does if(x!=y) execute?
A. when x doesn't equal y
B. when x does equal y
C. when x is greater than y

Answers

Answer:

A

Explanation:

Create a defined name for range b6:e6 using walkup as the range name

Answers

In order to create a defined name for the range, one must follow the steps below.

What are the steps to creating a named range?

Step 1 - Select the concerned range (Rows and columns inclusive of the labels)Step 2 - From the Ribbon above, select Formulas. Then select "Create From Selection".From the "Create From Selection" dialogue box, select the option that is indicative of the location of your row / column.Click "Ok".

Learn more about Named Range at:
https://brainly.com/question/13396823
#SPJ1

3. Which of the following is most likely fake news?
O A. Content from a website that ends in ".edu"
OB. A news site that lists all of its contributing authors
OC. An article that tries to sell you miracle weight loss pills
O D. An academic resource listed in a bibliography

Answers

Answer:

C. An article that tries to sell you miracle weight loss pills

changing the ___ sometimes can help you find a contact information more quickly​

Answers

Answer: View
(I really hope this helps?)

of
tion
TCP/IP was developed in the 1960s to enable university scientists to locate other computers on the Internet.
Select one:
O True
O False

Answers

Answer:

True

Explanation:

What is a group of two or more integrated hard disk called

Answers

Answer:

Redundant Array of Independent Disks known as RAID

Explanation:

Other Questions
Consider the ordered pairs (1, 4), (1, 2), and (0, 3). Which of the four equations below could have been used to generate these three ordered pairs? A. y = x + 3 B. y = x 6 C. y = x + 3 D. y = x 3 What is the primary purpose of a quotation in an essay? Pls answer these for me! write a plot synopsis of the most dangerous game Describe the characteristics of a double replacement reaction, how identified, and types of compounds in the reactants and products. give an example in a response Multi-modal combines several modes of shipment. The most common multi-modal combination globally is Group of answer choices rail-water-rail-truck truck-rail-truck-water truck-rail-water-rail-truck None of these answer choices is correct. depositors lack of information about the quality of bank assets can lead to: Which reading strategy will best help you gain understanding during reading?a.Summarizingc.Questioningb.Making a predictiond.SkimmingPlease select the best answer from the choices providedABCD In the room the women come and go talking of michelangelo. what is the most likely reason for the women to be speaking of michelangelo? they want to make eavesdroppers curious. they want to be perceived as cultured. they are planning a trip to italy. they do not want to talk to the men. Can anyone help me with this one? Question is the attachment f(x)=x^3+10x^2+31x+30 this answer doesnt't answer my question IT IS WRONG!!!!!!!!!There is a bag filled with 3 blue and 5 red marbles.A marble is taken at random from the bag, the colour is noted and then it is replaced.Another marble is taken at random.What is the probability of getting 2 blues?answer this properly please What do the scholars mean when they say that China should embrace universal values?China should increase the size of its military.China should begin to support and promote human rights.China should exercise greater authority on the world stage.China should show more respect for its scholars and educators. How do you write 189% as a fraction, mixed number, or whole number? Enzymes use several types of catalytic mechanisms. Differentiate between acid-base catalysis, covalent catalysis, and metal ion catalysis. In pea plants, tallness (t) is dominant to shortness (t). what are the predicted percentages of the genotypes of the offspring if a homozygous short plant is crossed with a heterozygous tall plant? Which statementbest completes the list showing the steps in the presidentialelection process?1. Potential presidential candidates form exploratory committees.2.?3. Candidates for eachparty compete in a general election. A. Parties select their presidential candidates through primaries andcaucuses B. National conventions are held to select candidates for the primaryelections.C. Members of the Electoral College formally select the president ofthe United States. D. The Senate approves a list of candidates for each party'spresidential nomination. Why did the Democrats defeat the Fusion ticket in the 1898 North Carolina election? For Rs 10,000 at 10% per annum. What will be the interest after 4 years?