Computers and Technology
Computers and Technology, 28.12.2019 06:31, Jhart1234

Aprofessor is working with five teams in his marketing research class. he decides to experiment with path-goal theory in these groups accomplish their off-campus studies. group a has done a project for him before. he gets them setting challenging goals and seeks to get them to produce an even better project this time. with group b he provides very specific guidelines, sets deadlines, and lays out the rules of the class and project. he lets group c manage their own task. he encourages them, works on building a strong rapport with them, and tries to meet their needs related to the project. by the time he gets to group d, he discovers they're already lost, confused, and a week behind everyone else. he sets a work schedule for them and provides step-by-step guidelines regarding the project so they won't get confused or distracted again. refer to table 13.4. with group a, the professor is using: a) an instrumental style. b) a supportive style. c) a participative style. d) an achievement-oriented style.

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 18:30, sawyerfauver
The computers in the sales department did not have enough data storage capacity to contain all the information the department needed to store, and it was taking a long time for team members to access the data they needed. to fix the problem, the technician installed new, larger hard drives on all the computers.
Answers: 1
image
Computers and Technology, 24.06.2019 12:00, exoticbunnylover123
Which spreadsheet operation does a look function perform?
Answers: 1
image
Computers and Technology, 24.06.2019 20:50, cookie1701
Which key function of a business involves finding, targeting, attracting, and connecting with the right customers?
Answers: 3
image
Computers and Technology, 24.06.2019 21:30, keelynnbarrier
Computer security/cybersecurity1) each of the following code fragments contains a number of security vulnerabilities. for each fragment, identify these security vulnerabilities and, for each vulnerability, discuss at least one way that it could be improved. note that in your discussion of how each vulnerability could be improved, you do not need to re-write a new version of the program in c; simply discuss your solution, either in pseudocode or in 1-2 sentences. a) /* file descriptor leak */#include #include int main(int argc, char *argv[]){ char *filepath = argv[0]; char *shellpath = argv[1]; file *passwords; passwords = fopen(filepath, "r"); /* read the password and do something with it */ /* . . */ /* fork and execute alternative shell */ execl(shellpath, "shell", null); }b)#include /* assume the following function is written for an electronic storefront. the user will enter the id of the item to be ordered, as well as the quantity of units that they would like to purchase. the program will then lookup the price for the price for the item using a predefined function, and return the total cost of the order.*/int gettotalcost(){ char itemid[9]; int price, unitsordered, cost; printf(" enter the 9-digit id of the item to be ordered: "); scanf("%s", & itemid); /* lookup the price according to the itemid */ price = getpricebyid(itemid); printf(" enter the quantity of units to be ordered: "); scanf("%d", & unitsordered); cost = price * unitsordered; return cost; }c)#include /* the following function is intended to return a user's full name by concatenating the user's first and last name into a single string and then returning that string. */char *getfullname(char *firstname, char *lastname, int max_len){ char fullname[max_len]; strcpy(fullname, firstname); strcat(fullname, " "); strcat(fullname, lastname); return fullname; }d)#include /* the following code snippet runs through the list of cli arguments entered and displays them to the console. */int main(int argc, char *argv[]){ int i; printf("you've entered the following arguments: "); for(i = 0; i < argc; i++){ print(argv[i]); printf("\n"); } /* */}
Answers: 2
Do you know the correct answer?
Aprofessor is working with five teams in his marketing research class. he decides to experiment with...

Questions in other subjects: