3. Why is human resource plan made​

Answers

Answer 1

Answer: See explanation

Explanation:

Human Resource Planning refers to the process whereby the future human resource requirements of an organization is predicted and how the current human resources that the organization has can be used to fulfill the goals.

Human resources planning is made as it's useful helping an organization meet its future demands by supplying the organization with the appropriate people.

Human resource planning also allows organizations plan ahead in order to have a steady supply of effective and skilled employees. It also brings about efficient utilization of resources. Lastly, it leads to better productivity and organizational goals will be achieved.


Related Questions

A) Write "T" for true statement and "F" for false statement.

ii) Programming in machine level language is very easy.
iii) In Adobe Photoshop, Rectangle tool is used to draw rectangle shape​

Answers

Answer:

ii. False

iii. True

Explanation:

Machine and assembly are referred to as a low level programming language used in writing software programs or applications with respect to computer hardware and architecture. Machine language is generally written in 0s and 1s, and as such are cryptic in nature, making them unreadable by humans but easily understandable to computers.

In view of the above, we can deduce that programming in machine level language is very difficult for humans.

Adobe Photoshop is a proprietary software application designed and developed by Adobe inc. for both Windows and MacOS operating system. It is a raster graphics editor that's typically used for imaging and graphics design. It comprises of various shape tools such as ellipse, line, polygon, triangle, custom shape and rectangle.

Generally, the Rectangle tool is used to draw rectangle shape (vector and pixel-based)​ in Adobe Photoshop.

which among the following shortcut key is used to check spelling​

Answers

click Alt + f7 to check spelling

Answer:

Simply click Alt + F7 keys

Define a method pyramidVolume with double parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volume of a pyramid with a rectangular base. Relevant geometry equations: Volume

Answers

Question:

Define a method pyramidVolume with double parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volume of a pyramid with a rectangular base. Relevant geometry equations:

Volume = base area x height x 1/3

Base area = base length x base width.

(Watch out for integer division)

import java.util.Scanner;

public class CalcPyramidVolume {

   /* Your solution goes here */

   public static void main (String [] args) {

     System.out.println("Volume for 1.0, 1.0, 1.0 is: " + pyramidVolume(1.0, 1.0,   1.0));

     return;

    }

}

Answer:

import java.util.Scanner;

public class CalcPyramidVolume {

   /* Your solution goes here */

   public static void main (String [] args) {

       System.out.println("Volume for 1.0, 1.0, 1.0 is: " + pyramidVolume(1.0, 1.0, 1.0));

       return;

   }

   

   //Begin method definition

   public static double pyramidVolume(double baseLength, double baseWidth, double pyramidHeight){

       

       //First, calculate the base area of the pyramid

       //store the result in a double variable

       double baseArea = baseLength * baseWidth;

       

       //Then, calculate the volume of the pyramid

       //using the base area and the base width

       double volume = 1 / 3.0 * baseArea * pyramidHeight;

       

       //return the volume

      return volume;

   }

}

Output:

Volume for 1.0, 1.0, 1.0 is: 0.3333333333333333

Explanation:

The code above contains comments explaining the important lines of the code. The output of the code has also been provided above.

The parts of the code that are worth noting are:

(i) The return type of the method pyramidVolume should be a double since calculations are done using double values. i.e the method header should be written as

public static double pyramidVolume(){

}

(ii) The method requires three(3) parameters of type double: baseLength, baseWidth and pyramidHeight. These should be included in the method. Therefore, the complete header definition should be:

public static double pyramidVolume(double baseLength, double baseWidth, double pyramidHeight){

}

(iii) The formula for calculating the volume of the pyramid should be:

volume = 1 / 3.0 * baseArea * baseWidth;

Rather than;

volume = 1 / 3 * baseArea * baseWidth;

This is because integer division yields integer result. If 1 / 3 is evaluated, the result will be 0 since the decimal part will be truncated thereby making the result of the volume = 1 / 3 * baseArea * baseWidth will be 0.

Therefore, the work around for that should be to write 1 / 3.0 or 1.0 / 3.0 or 1.0 / 3.

(iv) After the calculation, the result of volume should be returned by the method. This will enable a proper call by the main method for execution.

Identify at least three tips you would give to people to stay safe on the Internet so that their information stays secure. Explain why these tips are useful.

Answers

Answer:

1. Do not give away personal information such as your address, school you go to, or anything like that (obvious reasons

2. Do not share your passwords because people can hack into your things

3. Don't make guessable passwords such as Cookies, ILovePizza, Money

1. Never give out your address, phone number, school name, etc.
This can lead to so many bad things. To protect yourself and others around you, don’t share your personal information to people you don’t know or trust.

2. Don’t add people on social media that you don’t know. I know a lot of people have public accounts and I’m not saying thats bad, but I am saying that you need to be careful on who’s adding you. There are a lot of creepy people out there.

3. Never open links people send you. If someone sends you a link online, it’s best to not open it. This opens up a whole new world for creeps to mess with you. They can track you, give you a virus or viruses. Never open random links that random people send you.

Can you think of other businesses that might benefit from using voice response this system?​

Answers

Answer:

call centers benfit big in this field

Explanation:

What is not an advantage of a computer network?


Select one:

A.Remote Information Access

B.Interaction among cooperative application programs

C.Social Engineering

D.User Communication

E.Resource Sharing​

Answers

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

Which of the following describes an iteration in a computer program?

Answers

Answer:

a set of instructions that can be run multiple times throughout a program

Explanation:

Complete the steps for adding a recurring event.

1. Click
.

2. Then, choose
.

3. Enter the necessary details, and click
.

4. Specify the recurrence details.

Answers

Answer:

which type of questions is this

Implement a class named MyArrayList that extends class the java.util. ArrayList. The class MyArrayList overrides the add(obj) method in the following way: it adds obj into the list if the object does not occur in the list or it occurs in the list only once; otherwise, if the object occurs in the list more than once, then the method does nothing.

Answers

Answer:

import java.util.ArrayList;

import java.util.Collections;

public class MyArrayList<T> extends ArrayList<T> {

 public boolean add(T obj) {

   if (Collections.frequency(this, obj) < 2) {

     return super.add(obj);

   }

   return false;

 }

}

Explanation:

According to the requirement, an element with the same value can occur at most twice in the list.

The Collections.frequency utility is useful to count the occurrances.

Sure, here's an implementation of the `MyArrayList` class that extends `java.util.ArrayList` and overrides the `add` method as described:

```java

import java.util.ArrayList;

import java.util.HashMap;

import java.util.Map;

public class MyArrayList<E> extends ArrayList<E> {

   "ATTHERATE"Override

   public boolean add(E obj) {

       // Count occurrences of each element in the list

       Map<E, Integer> countMap = new HashMap<>();

       for (E element : this) {

           countMap.put(element, countMap.getOrDefault(element, 0) + 1);

       }

       // Check if obj occurs in the list only once or not at all

       if (!countMap.containsKey(obj) || countMap.get(obj) == 1) {

           return super.add(obj);

       }

       // If obj occurs more than once, do nothing

       return false;

   }

}

```

In this implementation, the `add` method first counts the occurrences of each element in the list using a `HashMap`.

Then, it checks whether the given object `obj` occurs only once or not at all in the list. If so, it adds the object to the list using the `super.add(obj)` call.

If `obj` occurs more than once, the method does nothing by returning `false`. This way, the `MyArrayList` class ensures that duplicates are added only once, or not at all, as required.

Know more about java:

https://brainly.com/question/12978370

#SPJ5

Using only AND, OR and inverter gates to implement the above Boolean equation, how many gates are needed

Answers

Answer: hello your question has some missing data attached below is the missing data

answer : 10 gates

Explanation:

Logic diagram Using only AND, OR and inverter gates

x = A ⊕ B ⊕ C

attached below is the require Logic diagram Using only AND, OR and inverter gates .

number of inputs > 2

number of gates needed = 10

I need solutions to below questions with python code:
Write a program, my_family.py For Loop A program, work-list.pyList
1. that contains a Tuple holding the names of friends or family members. Then use a For Loop to read and print the names.
2. that contains a of six integers. Use a list method to add one more integer. Use a list method to sort the list. Use a While Loop to print the entries.

Answers

Answer:

1) my_family.py

family = ('Dad', 'Mom', 'Agnes', 'David', 'Chris', 'Millie')

for name in range(len(family)):

   print(family[name])

2) work_list.py

my_number = [2, 6, 3, 1, 8, 4]

# add items at the end of the list.

my_number.append(0)

my_number.append(5)

# sorts the list, default - ascending.

my_number.sort()

size = 0

while size < len(my_number):

   print(my_number[size])

   size += 1

Explanation:

The tuple and list data structures are ordered, using indexes to locate items in its container.

The family.py file uses the for-loop to iterate and print the family names in the tuple.

The work-list.py file contains a list of integers which is modified by adding items at the end of the list with the append method and a prints all the items using a while-loop.

HELP NOW PLS now now now

Answers

Answer:

6.enable data to pass between computers in a network to aid communication between users. As a network engineer, you'll have responsibility for setting up, developing and maintaining computer networks within an organisation or between organisations.

7.Sony

At times, what seems to be an effective value network can also be vulnerable to quickly losing effectiveness. At one time, Sony Corporation set up a value network designed to have a "one-stop" gaming experience for its customers. From 2003 to 2008, Sony designed an all-encompassing gaming portal. However, the network was disrupted when computer hackers began breaking into the system and retrieving sensitive banking data from the network users. As a result, the effectiveness of the network was severely compromised.

Explanation:

An analyst suggests that the lower the number of clusters, would give us the strongest and most meaningful result, as opposed to a large number of clusters.

a. True
b. False

Answers

Answer:

a. True

Explanation:

Various studies have shown that this is true. Clusters allow you to group together large sets of data into smaller groups in order to find similarities between all the data. Having a smaller number of clusters has been proven to allow you to discover much simpler similarities which can have a much greater impact. Larger sets can help in discovering more unique similarities but they do not have as large of an impact and are less meaningful. This is also why it is recommended to have a lower number of clusters when analyzing data sets.

write a java program to input two double type numbers and by using suitable mathematical functions print the maximum and minimum numbers out of the two numbers.
[tex]java \: me \: likhna \: ok[/tex]

Answers

Answer:

The program in Java is as follows:

import java.util.Scanner;

public class Main{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 double n1, n2;

 n1 = input.nextDouble();

 n2 = input.nextDouble();

 double Max = Math.max(n1,n2);

 double Min = Math.min(n1,n2);

 System.out.println("Max: "+Max);

 System.out.println("Min: "+Min); }}

Explanation:

This declares the numbers

 double n1, n2;

This gets input for n1

 n1 = input.nextDouble();

This gets input for n2

 n2 = input.nextDouble();

This gets the max of both using the max function

 double Max = Math.max(n1,n2);

This gets the min of both using the min function

 double Min = Math.min(n1,n2);

This prints the max

 System.out.println("Max: "+Max);

This prints the min

 System.out.println("Min: "+Min);

Accenture is helping a large retailer transform their online sales and services. The Data Analyst audits the client’s customer journey and maps out the kind of data they need to collect at each touch point. How does this help the client achieve their objectives?

Answers

Answer:

d. by increasing their customer knowledge and leveraging that information to improve customer experience

Explanation:

Consumers are at the heart of all businesses as they are the ones who our product are targeted. They purchase these goods and the company makes profit. Therefore, it is paramount for businesses to identify their target consumers in other to understand their preference and serve them accordingly. With data analytics, a consumers purchase history, likes and viewed products may be used to improve relationship between consumers and service providers. Once a consumer's preference is anlysed using data, then this is leveraged to improve the kind of service offered to such consumer leasing to better consumer experience.

The way in which the auditing of the client’s customer journey and mapping out the kind of data they need to collect at each touch point helps the client achieve their objectives is;

A: by updating their sales platform and adding new features

The missing options are;

A. by updating their sales platform and adding new features

B. by shifting the focus away from the customer and towards new products or services

C. by identifying products that are poor sellers and removing them from the inventory

D. by increasing their customer knowledge and leveraging that information to improve customer experience.

Looking at the given options, the one that is correct is Option A. This is because the company will by that medium, introduce new features that would be very useful in making the sales platform to be more efficient.

Now, Accenture is a company that does consultancy services by providing digital solutions to companies to help them to optimize their business operations. Thus, their different tools will help to give this their client an extra edge that will give them a good advantage over their competitors.

Read more about Accenture at; https://brainly.com/question/25702705

The most serious security threat to Bluetooth-enabled devices is ____, which occurs when a hacker gains access to the device and its functions without the owner's consent.

Answers

The most serious security threat to Bluetooth-enabled devices is [tex]\sf\purple{bluebugging}[/tex], which occurs when a hacker gains access to the device and its functions without the owner's consent.

[tex]\large\mathfrak{{\pmb{\underline{\orange{Happy\:learning }}{\orange{.}}}}}[/tex]

Which of the following answer choices best describes the algorithmic purpose of method num?

/** Precondition: i==0; */

public static int num(int[] ray, int i)
{
if( i >= ray.length ){
return 0;
}
if( ray[i] % 2 != 0 ){
return 1 + num( ray, i+1 );
}
else{
return 0 + num( ray, i+1 );
}
}

a. The method is counting the number of numbers in ray.
b. The method is counting the number of even numbers in ray.
c. The method is counting the number of occurrences of x in ray.
d. The method is counting the number of odd numbers in ray.
e. The method is summing all of the numbers in ray.

Answers

Answer:

d.

Explanation:

It is a recursive function that returns the number of odd numbers in ray starting at index i and above.

The depth of the recursion is equal to the length of ray.

UNIX inodes are an example of an indexed file allocation scheme. What levels of indexing were they designed to support. A. Direct B. Single indirect C. Double indirect D. Triple indirect E. All of the above are supported by UNIX inodes.

Answers

Answer: E. All of the above are supported by UNIX inodes

Explanation:

An inode refers to the data structure that's in the UNIX operating systems which consists of vital information that has to do with the files that's within a file system.

It should be niteec that when there's creation of a file system in UNIX, then a set amount of inodes will be created too.

The levels of indexing that the UNIX inodes were designed to support include the direct, single indirect, double indirect and the triple indirect. Therefore, the correct option is E.

The register in the CPU is not the same as the RAM.
Group of answer choices

True

False

Answers

The answer is true ..........

Static methods can be called directly from the name of the class that contains the method.

a. True
b. False

Answers

the answer is false.
I would say false because thats not the person that owns it its just in their class

write a java program to input the corresponding data to print the result of the following expression
y=ax²+bx+c

Answers

Answer:

The program in Java is as follows:

import java.util.Scanner;

public class Main{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 float a, b, c, x, y;

 a = input.nextFloat();

 b = input.nextFloat();

 c = input.nextFloat();

 x = input.nextFloat();

 y = a * x * x + b * x + c;

 System.out.print(y); }}

Explanation:

This declares all variables

 float a, b, c, x, y;

The next 4 lines get input for a, b, c and x

 a = input.nextFloat();

 b = input.nextFloat();

 c = input.nextFloat();

 x = input.nextFloat();

This calculates the value of y using [tex]y = ax^2 + bx + c[/tex]

[tex]y = a * x * x + b * x + c;[/tex]

This prints the calculated value of y

 System.out.print(y);

A _____ virus uses the language of an application that records a sequence of keystrokes and instructions in an application, such as word processing or spreadsheet, to hide virus code.

Answers

Answer: macro virus

Explanation:

The virus that uses virus uses the language of an application which is vital in recording the sequence of the keystrokes and the instructions in an application, like spreadsheet or the word processing in order to hide virus code is the macro virus.

A macro virus is simply a computer virus which is written in same macro language that is being used for software programs. When a software application is being infected by the macro virus, it leads to a sequence of actions which automatically start when the application is being opened.

17. Which of the following keyboard shortcut is used to copy the selected text?
a. Ctrl+c
b. Ctrl+V
c. Ctrl+X
d. Ctrl+Z​

Answers

Answer:

ctrl+c is used to copy the selected text

Answer:

A. Ctrl+c

Explanation:

I took the test, also you can use Command c and Command v to copy and paste.

People who know about phones, what do you think about the phone "Samsung Galaxy A21s"?

Answers

Answer:

iphone is better but if u like it then ok

Explanation:

You are the IT administrator for a small corporate network. The employee in Office 1 occasionally needs a previous version of her report files. You need to configure her computer so that you can restore the computer to a point in time if needed. In this lab, your task is to complete the following:
Turn on system protection on the C: volume and set a maximum of 5% of disk space for system protection. Turn on system protection on the D: volume and set a maximum of 5% of disk space for system protection. Create a manual restore point. When naming the restore point, choose your own name for the restore point.

Answers

Answer:

Explanation:

Assuming you have Windows 8 or 10 as the operating system, you would need to do the following. In the search input in the taskbar search for "Create a System Restore Point". In this window, navigate to the System Protection tab. Here, you need to click on the drive you want, we can do C first, and click on the button that says "configure". Here you want to turn on System Protection and set the disk space to 5%. Now click apply and ok and repeat for drive D.

Once that is done you will need to create a manual restore point by clicking the button that says create and giving it the name of your choice.

% Do not modify CalculateSum function maxSum = CalculateSum(userNum1, userNum2, userNum3) maxSum = MaxValue(userNum1, userNum2) + userNum3; end % Define a function MaxValue that returns the largest input value % Function inputs: numA, numB % Function output: maxNum % function maxNum ...

Answers

Answer:

The function in Python is as follows:

def MaxValue(userNum1, userNum2):

   if userNum2>userNum1:

       return userNum2

   else:

       return userNum1

Explanation:

This defines the function

def MaxValue(userNum1, userNum2):

This returns userNum2 if userNum2 is greater than userNum1

   if userNum2>userNum1:

       return userNum2

If otherwise, this returns userNum1

   else:

       return userNum1

Sum-of-minterms form is a _____. a. compact function notation that represents each literal by a number b. product term having exactly one literal for every function variable c. variable appearance in an expression in true or complemented form d. canonical form of a Boolean equation where the right-side expression is a sum-of-products

Answers

Answer: D. canonical form of a Boolean equation where the right-side expression is a sum-of-products

Explanation:

Sum-of-minterms form is refered to as the canonical form of a Boolean equation such that the right-side expression is the sum-of-products.

It should be noted that the minterms whose sum helps in defining the Boolean function will be the ones that give the 1's with regards to the functions in the truth table.

advantages of torsion in engineering​

Answers

Answer:

Ascertain product failure

Advantages that excel have over paper and pen work​

Answers

Answer:

You can use formulas to create systems on excel.

Explanation:

What are the main dimensions of information system and their components

Answers

Answer:

The dimensions of information systems include organizations, management, and information technology. The key elements of an organization are its people, structure, business processes, politics, and culture. An organization coordinates work through a structured hierarchy and formal standard operating procedures.

Other Questions
What does it mean for a poem to show a "glimpsed moment"?A.Poetry generally should not be longer than a single manuscript page.B.Poetry tries to hide things from the reader to create a sense of confusion.C.Poetry often shows a brief but complex part of a larger story or idea.D.Poetry is primarily visual and includes details that appeal to the eyes. HELLLLLLLPPPPPPPPPPPP MEEEEEEEEEEEEEEEE PLSs 1CorrectHow is a scientific law different from a scientific theory?A.A theory becomes a law after a long period of time has passed.B.A theory is why something happens and a law is how something happens.C.A theory cannot be disproved but a law can be disproved.D.A theory is used for biology and chemistry and a law is used for physics.Next What is the format of article writing?Plzz helpWill mark brainliestLinks will be reported Someone help me please want asap You are flying a kite and want to know its angle of elevation. The string on the kite is 39 meters long and the kite is level with the top of a building that you know is 24 meters high. Find the angle of elevation of the kite.a.58.392b.37.980c.31.608d.52.020 what is a product made from no renewable resources Please help, This is due soon What protects your computer so that it doesnt get a computer virus?Internet BrowserAntivirus SoftwareKeyboard ProtectorMy Teacher aekghkwrhgflhwdlfuhwiughwhgwheofwegh;hgiow help In a clinical test with 2161 subjects, 1214 showed improvement from the treatment. Find the margin of error for the 95% confidence interval used to estimate the population proportion. Quadrilateral is shown in the coordinate plane below.Draw an image of quadrilateral on the coordinate plane reflected over the y-axis. need help again pls and ty Explain why 4x+1 is equal to 2x+12 please do both of them THANK YOU 1. Given f(x) = x2 X and g(x) = 3x + 2, find f(g(2)) In the passage, what does reign mean?A. the rule of a leaderB. the protection of a leaderC. the vision of a leaderD. the property of a leader Which character is the best example of an archetype? solve each problem part 2a. NO LINKS!!!! JK is J(-3 9) and K(5 -1), if LM is perpendicular to JK, what is the slope of LM?