answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Airida
1 month ago
12

The budget process which emphasizes the achievement of goals and competition between alternatives is:

Computers and Technology
1 answer:
Rzqust [894]1 month ago
4 0

The question offers several choices;


<span>A) </span>Incremental budgeting.
B) Performance budgeting.
C) Program budgeting.
D) Target based budgeting.


I'd argue that D is the correct option; Target based budgeting.


Target based budgeting centers on achieving objectives and competing alternatives. This budgeting approach uses pricing as a strategic tool to influence sales outcomes. It involves market research to determine the precise selling price of a product.






You might be interested in
You are a police officer trying to crack a case. You want to check whether an important file is in the evidence room. Files have
Harlamova29_29 [932]

Answer:

Since RANDY operates randomly, any file within the specified index range will have the recurrence relation as follows:

T(n) = T(n-i) + O(1)

Here, the probability is 1/n, where i can vary between 1 and n. The variable n in T(n) denotes the size of the index range, which will subsequently reduce to (n-i) in the following iteration.

Given that i is probabilistically distributed from 1 to n, the average case time complexity can then be expressed as:

T(n) = \sum_{i=1}^{n}\frac{1}{n}T(n-i) + O(1) = T(n/2)+O(1)

Next, solving T(n) = T(n/2) + O(1)

yields T(n) = O(log n).

Thus, the complexity of this algorithm is O(log n).

It should be noted that this represents the average time complexity due to the algorithm's randomized nature. In the worst-case scenario, the index range may only decrease by 1, resulting in a time complexity of O(n) since the worst-case scenario would be T(n) = T(n-1) + O(1).

3 0
29 days ago
Read 2 more answers
Write a program that creates a login name for a user, given the user's first name, last name, and a four-digit integer as input.
Amiraneli [921]

Answer:

In C++:

#include <iostream>

#include <string>

#include <sstream>

using namespace std;

int main(){

   string lname, fname, stringnum;    int num; string login, pwd;

   cout<<"Last Name: ";    cin>>lname;

   cout<<"First Name: ";    cin>>fname;

   cout<<"Four-digit integer: ";    cin>>num;

   stringnum = to_string(num).substr(0, 4);

   stringstream geek(stringnum);    geek>>num;

   num = num%100;

   pwd = to_string(num);

   if(lname.length()<5){ login = lname + fname.substr(0, 1);    }

   else{ login = lname.substr(0, 5) + fname.substr(0, 1);    }

   cout<<"Login Name: "<<login<<endl;

   cout<<"Password: "<<pwd<<endl;

   return 0;

}

Explanation:

This initializes all the required variables

   string lname, fname, stringnum;    int num;     string login, pwd;

This asks the user for their last name

   cout<<"Last Name: ";    cin>>lname;

This asks for the first name of the user

   cout<<"First Name: ";    cin>>fname;

This prompts for a four-digit number

   cout<<"Four-digit integer: ";    cin>>num;

This converts the number into a string and extracts the first four digits

   stringnum = to_string(num).substr(0, 4);

This changes the string back into an integer

   stringstream geek(stringnum);    geek>>num;

This extracts the last two digits of the four-digit number

   num = num%100;

This generates the user's password

  pwd = to_string(num);

This constructs the user's login name.

This block runs if the last name has fewer than five letters

   if(lname.length()<5){ login = lname + fname.substr(0, 1);    }

This block runs otherwise

   else{ login = lname.substr(0, 5) + fname.substr(0, 1);    }

This displays the login name

   cout<<"Login Name: "<<login<<endl;

This displays the password

   cout<<"Password: "<<pwd<<endl;

3 0
1 month ago
Discussion Question 10: A bank in California has 13 branches spread throughout northern California , each with its own minicompu
Harlamova29_29 [932]
The banking system that poses greater risk of vulnerabilities is the one with ten branches dispersed across California, where data resides on a central mainframe located in San Francisco. If the branches do not share data across the network, the risk of hacking is reduced. However, with a network setup, both data sharing and centralized storage increase exposure to unauthorized access.
3 0
21 day ago
Choose the person responsible for each innovation.
zubka84 [942]

Response:

John Blankenbaker

Reasoning:

5 0
1 month ago
To what extent are the following computer systems instances of artificial intelligence:
oksian1 [797]

Answer: Scanners used in supermarkets for barcodes and voice-activated phone menus are not examples of artificial intelligence.

Explanation:

(a) Supermarket barcode scanners can read codes, yet they lack the capability to employ machine learning techniques for learning patterns within the codes. Machine learning is a crucial aspect of artificial intelligence (AI), thus indicating they do not qualify as instances of AI. Likewise, voice-activated menus can only present options and do not carry out any complex tasks.

In contrast, web search engines and internet routing algorithms demonstrate dynamic and intelligent capabilities in processing and delivering information to users.

Hence, these are considered examples of AI.

8 0
1 month ago
Other questions:
  • Q) Select the two obstacles for data parsing
    5·2 answers
  • Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
    5·1 answer
  • The part of the computer that contains the brain, or central processing unit, is also known as the A.monitor B.modem C.keyboard
    10·1 answer
  • Which of the following is true of how computers represent numbers?
    9·2 answers
  • Why is computer called versatile machine?
    7·1 answer
  • Which of the following is true? a. Pseudocode is used to describe an algorithm. b. Pseudocode is not an actual computer programm
    11·1 answer
  • To finish creating a design for the webpage, use one shape to cut away part of the other. Create a 700 pixel by 700 pixel square
    10·1 answer
  • When adopting and implementing a Software as a Service (SaaS) platform such as Salesforce for your business, which responsibilit
    7·1 answer
  • A wireless network was recently installed in a coffee shop and customer mobile devices are not receiving network configuration i
    12·1 answer
  • Allison wants to use equations to simplify the process of explaining something to the Sales team, but the default eq
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!