Critical Thinking QuestionsCase 8-1Sarah, the administrative assistant to the vice president of sales, has a new assignment. She is now responsible for creating a presentation that highlights the monthly sales report data and marketing program results and then distributing the presentation to the district sales managers each month. The presentation will consist of four standard slides. All the slides should have a uniform look: for example, each slide should be formatted with a customized theme and should contain the company logo. Sarah asks you to meet her for coffee to discuss the best way to approach this new assignment.

Sarah begins by asking you to recommend the best, most effective way to create each month's presentation for distribution. You suggest that she ____.
a. create a presentation template file containing all the desired slide layouts, customized theme, and logo art; then use the template to create each month's presentation filec. ask her boss to transfer the assignment to the IT department, which has more experience working with complex PowerPoint issuesb. create each month's presentation file from scratch including all the necessary formatting and art; you just cannot think of a better way to get the task doned. create the first month's presentation file from scratch; then each subsequent month, open the previous month's presentation and just change the data

What will be an ideal response?


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following is not represented graphically in activity diagrams for control structures?

a. Transition arrow. b. Attribute. c. Action state. d. Decision symbol.

Computer Science & Information Technology

Use the schema R in the following questions:

R = (ABCDEFGH, {BE ? GH, G ? FA, D ? C, F ? B})
(a) What is a key of R? (b) What is the attribute closure of GH ? (c) Can there be a key that does not contain D? If such a key exists, give it; otherwise explain why it is not possible. (d) Is the schema in BCNF? Give the reason for your answer. (e) Use one cycle of the BCNF synthesis algorithm to decompose R into two sub-relations. For each sub-relation, explain whether or not it is in BCNF. (f) Give the general condition that guarantees that a decomposition is lossless. Apply the condition to your decomposition to show whether or not it is lossless. (g) Give the general condition that guarantees that a decomposition is dependency preserv- ing. Apply the condition to your decomposition to show whether or not it is dependency preserving. (h) * Consider a schema (R, ), where R is a set of attributes and is a set of functional dependencies. Assume further that

Computer Science & Information Technology

Match each item with a statement below.

A. A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage. B. A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance. C. Hardware virtualization support for AMD processors. D. A video graphics processing unit, can be used to provide accelerated video and 3D rendering. E. An option that enables a host PC's memory and processors to be split up into nodes. F. A disk that is tied to another disk, and only stores the changes between the two disks. G. A virtual floppy disk file that can be attached to a virtual machine. H. Allows the use of only as much memory as needed, within a specified range, by a virtual machine. I. Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down. J. Special hardware that handles cryptographic keys.

Computer Science & Information Technology

Values printed with the conversion specifiers e, E and f are output with __________ digits of precision to the right of the decimal point by default.

a) 0 b) 1 c) 5 d) 6

Computer Science & Information Technology