Scientific management uses: _________
a) standardized work methods.
b) linear programming.
c) digital computers.
d) motivation theory.

Answers

Answer 1

Scientific management uses: a) standardized work methods.

What is SCM?

SCM is an abbreviation for supply chain management and it can be defined as the effective and efficient management of the flow (transmission) of goods and services, as well as all of the production processes that are involved in the transformation of raw materials into finished products, in order to meet the insatiable want and need of the consumers on a timely basis.

This ultimately implies that, the supply chain management (SCM) is a strategic process which involves all the activities that are associated with planning, execution and supply of finished goods and services to the consumers on a timely basis.

In the supply chain management (SCM), scientific management is typically focused on the use of standardized work methods to meet the insatiable want and need of the consumers on a timely basis through efficient and effective supply of finished goods and services.

Read more on supply chain management here: brainly.com/question/24192635

#SPJ1


Related Questions

____ software is a collection of computer programs that manages the resources of the computer and facilitates access to those resources.

Answers

System software is a collection of computer programs that manages the resources of the computer and facilitates access to those resources.

What is System software?

System software is known to be a kind of a computer program that is known to be set up so that they can be able to run a computer's hardware as well as the application programs.

Note that if a person look at the computer system as a kind of layered model, the system software is one that can be referred to as the interface that exist between the hardware and user applications.

The operating system is said to be a good example of system software.

Therefore, System software is a collection of computer programs that manages the resources of the computer and facilitates access to those resources.

Learn more about System software from

https://brainly.com/question/24321656

#SPJ1

What Is Classification of Computers?

Answers

Answer:

Explanation:Sr.No.

Type

Specifications

1

PC (Personal Computer) or Micro-Computers

It is a single user computer system having a moderately powerful microprocessor. It is termed as a computer that is equipped microprocessor as its CPU.

2

Workstation

It is also a single user computer system, similar to the personal computer, however, has a more powerful microprocessor.

3

Mini-Computer

It is a multi-user computer system, capable of supporting hundreds of users simultaneously.

4

Main Frame

It is a multi-user computer system, capable of supporting hundreds of users simultaneously. Software technology is different from minicomputer.

5

Super-Computer

It is an extremely fast computer, which can execute hundreds of millions of instructions per second.

Identify the sampling method that was used. ten homeowners from each subdivision in a town are asked their opinion of the new recycling program

Answers

Based on the above that that ten homeowners from each subdivision in a town are asked their opinion of the new recycling program, the sampling method that is used is Stratified sampling method.

What is stratified sampling?

The term  stratified sampling is known to be one that is often by a lot of researchers share subjects into what we call a subgroups known as strata by the use of the characteristics that they known to share (such as race, gender, educational attainment and others.

Note that if they are shared or divided, all of the subgroup is said to be randomly sampled via the use of another probability sampling method.

Therefore, Based on the above that that ten homeowners from each subdivision in a town are asked their opinion of the new recycling program, the sampling method that is used is Stratified sampling method.

Learn more about Stratified sampling method from

https://brainly.com/question/20544692

#SPJ1

How do clustered systems differ from multiprocessor systems? what is required for two machines belonging to a cluster to cooperate to provide a highly available service?

Answers

In order to complete a distributed computational task, clustered systems are often built by fusing several computers into a single system.

On the other hand, multiprocessor systems could be a single physical object made up of numerous CPUs.

A multiprocessor system is more strongly coupled than a clustered system. While the processors in a multiprocessor system might be able to interact using shared memory, clustered systems require messages.

The state on the two machines needs to be copied and regularly updated for two machines to deliver a highly available service. If one of the machines breaks down, the other might step in to take over.

Learn more on clustered systems here:

https://brainly.com/question/26150121

#SPJ4

The ____ orders data and instructions from cache or ram based on the current task.

Answers

The prefetch unit orders data and instructions from cache or ram based on the current task.

Prefetch is a feature, introduced in Windows XP and still used in Windows 10, that stores specific data about the applications you run to help them start up faster. Prefetch is an algorithm that helps anticipate cache errors (when Windows requests data that is not stored in the disk cache), and stores that data on the hard disk for easy retrieval.

Superfetch is a feature that tries to determine which application you are going to launch and then loads all the necessary files and data into memory. Both of these features require several read and write operations to function.

You can learn more about Prefetch Windows here https://brainly.com/question/9810355

#SPJ4

Clicking the help button at a dialog box opens the _____ support website with specific information about the dialog box.

Answers

By clicking the help button at a dialog box opens the control support website with specific information about the dialog box.

What is a Dialog box?

The dialog box is known to be a kind of graphical control tool that is said to be in a way of a small window.

The term Help Button is one that functions as a kind of control that a user can select or use to show the application in regards to their help system.

It is known to be one that often helps one to communicates information to the user as well as quickens them for the set  response.

The Dialog boxes are said to be known to be "modal" or "modeless", based on if they block interaction and as such, By clicking the help button at a dialog box opens the control support website with specific information about the dialog box.

Learn more about dialog box from

https://brainly.com/question/23119185
#SPJ1

21. are promoters sequence-specific, or can all strings of as and ts work equally well? how did the taga promoter contradict the hypothesis that at-rich promoters are the best?

Answers

You can demonstrate that not all AT-rich promoters are the same because TATA is a significantly better promoter than TAAA. The promoter is therefore sequence-specific and not just found in regions of DNA that are AT-rich.

A promoter is a person or group of people who have the idea to start a successful business. Following conception, the promoters conduct preliminary research to ascertain the benefits and drawbacks of the proposal. In addition, they compute possible income, expected costs, and working capital requirements.

A promoter may be an employee of the company who organizes events on contract or a shareholder. Promoters request capital from investors to invest in a company so it can expand. They strive as shareholders to increase the return on both their own and other investors' capital.

Learn more about promoters https://brainly.com/question/20472836?

#SPJ4

In terms of shaping the future of cybersecurity in the United States, how influential do you think the Russian hacking efforts of the 2016 election compare to things like the Creeper Virus, Morris Worm, or Captain Zap’s hacking of the AT&T online computer system? What aspects of this incident could get in the way of the U.S. government responding effectively to the risks the hacking poses?

Answers

The influence of the Russian hacking efforts of the 2016 election was known to be greater when compare to things like the Creeper Virus, Morris Worm, or Captain Zap’s hacking of the AT&T online computer system.

What aspects of this incident could get in the way of the U.S. government responding effectively to the risks the hacking poses?

The aspect that government that government need to guard against is  stealing of government and business secret as well as people's personal information.

Note that they are a lot of tools that are known to be made up of the National Cybersecurity Protection System such as the EINSTEIN cyber intrusion detection system  and others.

Therefore, The influence of the Russian hacking efforts of the 2016 election was known to be greater when compare to things like the Creeper Virus, Morris Worm, or Captain Zap’s hacking of the AT&T online computer system.

Learn more about Cybersecurity from

https://brainly.com/question/28004913

#SPJ1

The it manager in your organization has asked you to install the fontconfig-3.10.87-5.fc24.rpm package, which is located in the /home/wadams/downloads directory. your task in this lab is to:__________

Answers

The steps to take in the above verification are:

At the prompt, key in su - and then click Enter.Also key in or Type 1worm4b8 as the known password and then clikc Enter.Do key in rpm -ivh /home/wadams/Downloads/fontconfig-3.10.87-5.fc24.rpm and then click Enter.Key in rpm -q fontconfig and then click Enter to verify that the package is known to be installed.

What is Fontconfig file?

Fontconfig (or fontconfig) is known to be a kind of a free software program library that is said to be set up so as to help to give some configuration, enumeration as well as the  substitution of fonts to other kinds of programs.

Note that the Fontconfig was said to be first written and handled Keith Packard, and it is known to be currently handled by Behdad Esfahbod.

Therefore, The steps to take in the above verification are:

At the prompt, key in su - and then click Enter.Also key in or Type 1worm4b8 as the known password and then clikc Enter.Do key in rpm -ivh /home/wadams/Downloads/fontconfig-3.10.87-5.fc24.rpm and then click Enter.Key in rpm -q fontconfig and then click Enter to verify that the package is known to be installed.

Learn more about programming from

https://brainly.com/question/26497128

#SPJ1

See full question below

Use the rpm -ivh command to install the fontconfig-3.10.87-5.fc24.rpm package.The package is located in the /home/wadams/Downloads directory.

Verify that the fontconfig package has been installed.

In __________ write, the data are stored in the cache, and control returns to the caller.

Answers

In an asynchronous write, the data are stored in the cache, and control returns to the caller.

An asynchronous write is a write operation that does not block the caller until the data is actually written to the underlying storage. The data is instead stored in the cache, and control returns to the caller. When the data is eventually written to the underlying storage, the write is said to be "completed".

Asynchronous writes can be useful in situations where blocking the caller is not desirable, or where the time to complete the write is not known in advance. For example, an application that is writing data to a slow storage device may choose to use an asynchronous write in order to avoid blocking the caller while the data is being written.

Learn more about Asynchronous write here:

https://brainly.com/question/10057909

#SPJ4

On an apple mac computer, the virtualbox uninstall tool is in the virtualbox ________.

Answers

Virtual box install ion file, installation files are stored in the download folder on Mac

In a print statement, you can set the ________ argument to a space or empty string to stop the output from advancing to a new line. newline end separator stop

Answers

In a print statement, you can set the end argument to a space or empty string to stop the output from advancing to a new line. newline end separator stop.

What is a print statement?

The print statement is known to be an element or a tool that is often used to send output to a given standard output unit.

This can be your monitor, or even your printer  of a given computer system.

Therefore, In a print statement, you can set the end argument to a space or empty string to stop the output from advancing to a new line. newline end separator stop.

Learn more about print statement from

https://brainly.com/question/27221616

#SPJ1

What controls the interactions between hardware and user applications?(1 point) domains domains programming languages programming languages system software system software hardware layers

Answers

The system software controls the interactions between hardware and user applications.

Which software controls the interaction between the user and the hardware?

The system software is known to be made up of the Operating system (OS).

The function of the Operating system (OS) is that it is a kind of a software that helps to controls as well as handle  and coordinates the computer hardware devices and it also function by helping to runs other software as well as applications on a computer.

Therefore, The system software controls the interactions between hardware and user applications.

Learn more about system software  from

https://brainly.com/question/24321656
#SPJ1

Since the ntfs file system enjoys more widespread compatibility with other operating systems, it is often used on removable devices such sd cards and usb flash drives.
a. true
b. false

Answers

Answer: false

Explanation:

When users connect to the network, they use a basic hardware terminal to access a desktop hosted on a virtualization server. what type of infrastructure is being deployed?

Answers

When users connect to the network, they use a basic hardware terminal to access a desktop hosted on a virtualization server Virtual Desktop Infrastructure(VDI) is being deployed.

Virtual Desktop Infrastructure (VDI) is a type of desktop virtualization that allows users to access a desktop hosted on a virtualization server. When users connect to the network, they use a basic hardware terminal to access the desktop.

VDI is becoming increasingly popular as it offers a number of advantages over traditional desktop computing. It is more scalable, more secure and more flexible.

One of the main benefits of VDI is that it is more scalable than traditional desktop computing. With VDI, more desktops can be added to the network without adding more hardware. This makes it ideal for organizations that are growing quickly.

Another benefit of VDI is that it is more secure. With VDI, each desktop is isolated from the others on the network. This makes it more difficult for viruses and other malware to spread.

Learn more on virtualization here:

https://brainly.com/question/27939176

#SPJ4

Design an algorithm for function to find the longest substring which contains 2 unique characters in a given stirng. you may list steps or psuedo code.

Answers

The fake code consists of the following two classes: public class LongestSubstr and import java.util.HashSet.

How Do Algorithms Work?

An algorithm is a process used to carry out a computation or solve a problem. In either hardware-based or software-based routines, algorithms function as a detailed sequence of instructions that carry out predetermined operations sequentially. All aspects of information technology employ algorithms extensively.

An algorithm is a series of instructions for completing a task or solving a conundrum.A common example of an algorithm is a recipe, which includes thorough instructions for making a dish or meal.An algorithm is a method for performing calculations or finding solutions to issues.Algorithms perform as a precise set of instructions that carry out preset activities consecutively in either hardware-based or software-based routines.Algorithms play a big role in information technology across the board.

Introduction to Algorithm Types:

Algorithm using brute force. Avaricious algorithmAlgorithm with recursion.

To learn more about algorithm, refer to:

https://brainly.com/question/13800096

#SPJ4

calculate the ideal mechanical advantage of the inlcined plane system.

Answers

Answer:

To find the ideal mechanical advantage of an inclined plane, divide the length of the slope by its height. An inclined plane produces a mechanical advantage to decrease the amount of force needed to move an object to a certain height; it also increases the distance the object must move

Explanation:

hope that explains it

Vince recently received the hash values of malicious software that several other firms in his industry found installed on their systems after a compromise. what term best describes this information?

Answers

A term which best describes the hash values of malicious software that several other firms in Vince's industry found installed on their systems after a compromise is: B. IoC.

What is a malware?

A malware can be defined as any type of software program or file that is designed and developed to be intentionally harmful to the host computer, server, website, or network, especially for the purpose of wreaking havoc and destruction such as a Trojan, Rootkit, etc.

What is an IoC?

An IoC is simply an abbreviation for indicator of compromise and it can be defined as an artifact which is found in an operating system (OS) or observed on a computer network, and as such serves as as forensic evidence of potential intrusions.

This ultimately implies that, an indicator of compromise (IoC) serves as a sign of malicious activity in an operating system (OS) or observed on a computer network.

In this context, we can reasonably infer and logically deduce that a terminology which best describes the hash values of malicious software that several other firms in Vince's industry found installed on their systems after a compromise is IoC.

Read more on indicator of compromise here: https://brainly.com/question/25521596

#SPJ1

Complete Question:

A. Vulnerability feed

B. IoC

C. TTP

D. RFC

This problem can sometimes be caused by disabling or refusing to accept cookies.

Answers

"The Page isn’t Redirecting Properly” Message is a problem that can sometimes be caused by disabling or refusing to accept cookies. Something went wrong if you experience the issue in your web browser.

The message basically signifies that the website keeps getting cycled through numerous addresses and may have become stuck in an infinite loop, which prevents you from accessing the website you wanted to.

In some cases, turning off or rejecting cookies can lead to this issue. The issue could be resolved by deleting your cookies for this site or permitting cookies from third parties.

An illustration of how cookies are used has been given on the link below

https://brainly.com/question/28142160

#SPJ4

An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 100 staff members. What is the minimum number of bits needed to assign a unique bit sequence to each staff member?.

Answers

An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 100 staff members. The minimum number of bits required to assign a unique bit sequence is 7.

This means that the office can have up to 2^7, or 128, different staff members. This is a pretty small office, and it's likely that they'll never have more than 100 staff members, so they don't need to worry about running out of space.

This means that each staff member can be assigned a unique work assignment with just 7 bits. This is a very efficient way to assign work, and it ensures that each staff member gets a unique assignment.

Learn more on bits here:

https://brainly.com/question/28214531

#SPJ4

If an ip address has the number 194 in the first octet, it is a class _______ address.

Answers

If an IP address has the number 194 in the first octet, it is a class C address.

If you're working with IP addresses, it's important to know the different classes. An IP address can be classified as a Class A, B, or C address. If the first octet of an IP address is 1-126, it's a Class A address. If the first octet is 127, it's a Class B address. And if the first octet is 128-191, it's a Class C address.

The number in the first octet tells us what class the address is in. For example, an address with the first octet of 194 is a Class C address. Class C addresses are most commonly used for home and small office networks.

Knowing the class of an IP address is important because it determines the range of addresses that can be used. For example, Class A addresses can be used for networks with up to 16 million hosts, while Class B addresses can be used for networks with up to 65,000 hosts.

So, when you're working with IP addresses, be sure to keep the different classes in mind. Knowing which class an address is in will help you understand what range of addresses can be used.

Learn more about IP address here:

https://brainly.com/question/27961221

#SPJ4

what is the headgear for​

Answers

Answer:

headgear is an orthodontic appliance used to correct bite and support proper jaw alignment and growth

An operating system is an example of which of the following?
A. Hardware
B.software
C.networking system
D.messaging system

Answers

B. Software.

Operating system is a software the supports a computer’s basic functions.

What are the major activates of operating systems with regard to file management?

Answers

Creating, deleting, manipluation, backing up file and mapping to permanent storage are the major activities of operating systems with regard to file management.

File basically refers to collection of specific information stored in the memory of computers and file management refers to the process of manipulating these files, such as  creating, modifying and deleting files.

Following are the five major activities of all operating systems in regard to file management :

Creating and deleting files:  This service creates new files and places them at the particular locations. Also it deletes unnecessary files.Creating and deleting directories: This function helps to store the files in separate folders known as directories that support users to search files quickly. Also deleting files from directories is performed by this activate.File manipulation instructions: It provides functionality to manipulate files and directories, such as modifying the data on files and changing  file names in the directories.Mapping to permanent storage: It helps in mapping files onto secondary storage so that the files can be located easily and quickly.Backing up files: This service prevents data loss by providing a backup facility of data on stable and secure storage devices.

File management is one of the basic and important functions that all operating systems perform. Therefore, creating, deleting, backing up and manipulation are the major activities of operating system regarding files management.

You can learn more about file management at

https://brainly.com/question/12736385

#SPJ4

What are the three different common divisions of cloud computing?

Answers

Answer:

1-private clouds

2-public clouds

3-hybrid clouds

Which windows feature, introduced in windows 95, helped eliminate device resource conflicts and precluded manual device configuration with jumpers?

Answers

The windows feature, introduced in windows 95, helped eliminate device resource conflicts and precluded manual device configuration with jumpers is known to be  called option b. Plug and Play.

What is meant by plug and play?

Plug and Play (PnP) is known to be an aspect of Windows that helps any  computer system to be able to adapt to hardware alterations with low intervention by a given user.

Note that user is one who can be able to can add as well as remove devices without to use of manual configuration, and without having the  knowledge of computer hardware.

Hence, The windows feature, introduced in windows 95, helped eliminate device resource conflicts and precluded manual device configuration with jumpers is known to be  called option b. Plug and Play.

Learn more about device configuration from

https://brainly.com/question/14949260
#SPJ1

Select the 3 TRUE statements about storing digital images.

Group of answer choices

When storing the original file, use highest resolution possible if you are not sure how the images might be used.

Back up important documents on an external storage device.

Don't include descriptive information, version or size, and intended use information, as this increases file size.

Keep the original high resolution file in a separate place and make a copy to edit and process.

To get a higher resolution image of a low resolution picture, simply resave it at a higher resolution.

Answers

Answer:

When storing the original file, use highest resolution possible if you are not sure how the images might be used.Back up important documents on an external storage device.Keep the original high resolution file in a separate place and make a copy to edit and process.

Explanation:

The other two are incorrect. -->

Descriptive info hardly affects file size. In fact this should be a requirement to identify the image.

You cannot go from a lower resolution image to a higher resolution image, only the other way around

Write code that sets the value of the variable num_cards to seven if its current value is less than seven. otherwise, don't change the value. assume that num_cards already has an initial value.

Answers

The program to illustrate the information is given below.

How to express the code?

num_cards = 5 #Assuming value of num_cards is 5 (You can take any value you want)

if num_cards<7 :

num_cards=7

print(num_cards)

def dice_eval(x,y):

if (x+y== 7)|(x+y== 11) :

return "Winner!"

elif (x+y== 2)|(x+y== 3)|(x+y== 12) :

else:

a = x+y

if a<10:

return "Point is 0"+ str(a)

else :

return "Point is " + str(a)

Example -

dice_eval(0,8) returns 'Point is 08'

Learn more about programs on:

https://brainly.com/question/26642771

#SPJ1

______ describes the way a document is printed or displayed on a screen.
Options are:
Red, Thesaurus, Mailing, Page Orientation, Track Changes.

Answers

Answer:

Page orientation.

Explanation:

Because the other words have nothing to make sense in this sentence.

You need to write a program that has karel move 6 times and then put a ball. Which control structure do you need to use?

Answers

You need to write a program that has karel move 6 times and then put a ball. The control structure you need to use is a For loop. This is because code reuse is greatly facilitated by functions.

A for loop can be used to repeatedly perform any of Karel's activities for a predetermined number of times. This will enable us to run a piece of code as many times as we need.

The structure for a for loop looks like this

for(var i = 0; i < count; i++) {

 /* code to execute count times */

}

Follow the link below to see other types of control structures

https://brainly.in/question/13330349

#SPJ4

Other Questions
Found in the urinary bladder, __________ resembles __________, but the apical cells are rounded, not flattened. As indicated below, write the equations of the line passing through the point (2, 4) and parallel to the line whose equation is y = x. Complete your work in the space provided. Part 1: Point-Slope form of the linear equation Part 2: Slope-intercept form of the linear equation Part 3: The general form of the linear equation You are observing a tissue under the microscope and notice dark concentric circles of matrix and osteocytes in lacunae. You identify this tissue as __________. he zeros of a quadratic function are 6 and -4. Which of these choices could be the function?A. f(x) = (x + 6)(x + 4)B. f(x) = (x + 6)(x 4)C. f(x) = (x 6)(x + 4)D. f(x) = (x 6)(x 4) Match the letter of the author with his or her description. Not all letters will be used.A. Margaret Atwood B. Alice MunroC. Juan RulfoD. Octavio PazE. Carlos SolorzanoF. Derek Walcott1. An avant-garde style is evident in scenes of my play, Crossroads: A Sad Vaudeville2. I primarily use dialogue to tell the short story, No Dogs Bark3. The following passage indicates the setting of my poem:"Mountains and lakes and more lakes(though Quebec is a restaurant and Ontario the empty interior of parliament buildings)with nobody climbing the trails and hauling outthe fish and splashing water..."4. The following passage alludes to my existential world view in the poem "Two Bodies": "Two bodies face to faceare two stars fallingin an empty sky." Where can an emt get key information about a hazardous materials incident such as a traffic accident with a tanker truck? Discuss your interest in environmental science. Which aspects of environmental science most fascinate you? How are your personal values related to your interest in environmental science? If you could choose one job or career related to environmental science, what would it be? You want to buy a $193,000 home. You plan to pay 5% as a down payment, and take out a 30 year loan for the rest. What is an important regulation process that connects various parts of a system? What has contributed to a shift in the type of skills needed for employees in the u.s. economy? Point P is located 2/5 of the distance from A to E. Point P is located at (-1, -1) and point Ais located at (-7, 5). What are the coordinates of point E? What is the term that refers to the recognizable traits associated with specific genetic information stored in an individual base sequence? You are an American Red Cross Disaster Program Specialist in charge of teams trained to help in sheltering displaced persons. You have been notified by your office to be prepared to deploy to conduct shelter operations. Your supervisor has asked you to come to the office to begin organizing volunteers and get prepared to set up shelters, if tasked. You check in before you begin.What NIMS Management Characteristic are you supporting? Exercise 1 Draw one line under each compound subject and two lines under the simple predicate they share. Circle the conjunction or conjunctions. Either Lani or Tessa will speak first. Which element forms easily into thin sheets?O carbonO heliumO goldO bromine find the perimeter of the polygon with vertices U (-2,4) V (3,4) and W (3,-4) You need to deploy an app to the app service. You must be able to create multiple instances of the app to handle the increased load, which scaling option you should implement? Every friday, dr. cruz would give a quiz in his psychology class. students quickly learned to be nervous on friday mornings, just before each quiz. getting nervous on fridays would be a(n):________ Which amino acid generates the following product in a transamination reaction with -ketoglutarate? The smallest particle and building block of all matter is calledHELP NEED ANSWER ASAP