a systems analyst conducts a preliminary investigation to study the _____ and recommend specific action.

Answers

Answer 1

A systems analyst conducts a preliminary investigation to study the schedule feasibility and recommend specific action.

A feasibility study is a thorough analysis of a proposed project that considers all elements essential to success in order to determine the project's likelihood of success. Business success can be primarily described in terms of ROI, which is the projected revenue from the project.

A proposed plan or project's viability is assessed in a feasibility study. A project or business venture is assessed for its viability as part of a feasibility study to ascertain if it will be successful.

A feasibility analysis, as its name suggests, is used to assess an idea's viability, such as confirming that a project is both legally and technically possible as well as economically justifiable.

As a project will fail if it is not finished on time, this assessment is crucial to its success. An organization determines the project's estimated completion time when determining scheduling feasibility.

The feasibility analysis assists in identifying any potential obstacles the proposed project may encounter, such as:

Internal project constraints, including those related to technology, finances, and resources.

Financial, marketing, and export restrictions are internal corporate constraints.

Logistics, the environment, laws and regulations, among other external constraints.

To know more about feasibility click on the link:

https://brainly.com/question/15016731

#SPJ4


Related Questions

If String str = "United States";, then what is the value of str.substring(2, 4);? (2 points)

ni
nit
it
ite
nite

Answers

Explanation:

Program PascalABC:

Rezult  ited

Both radio and television signals are carried by radio waves. What other type of electromagnetic radiation is used to send information over long distances?



a
ultraviolet light
b
X-rays
c
gamma rays
d
microwaves

Answers

Answer:

Explanation:

c

Which statement is NOT related to computational thinking?

Answers

The statement that is not related to computational thinking are option A, B and D:

The result of computational thinking is a problem broken down into its parts to create a generalized model and possible solutions.  

Computational thinking involves the techniques of decomposition, pattern recognition, abstraction, and algorithm development.

Computational thinking is a set of techniques used to help solve complex problems or understand complex systems.

What exactly is computational thought?

That difficult challenge is broken down into a succession of smaller, more manageable problems using computational thinking (decomposition).

Note that the ability to apply core ideas and logic from computer science and computing to address issues across all domains is known as computational thinking. CT is a set of problem-solving techniques used in education that entails describing issues and potential answers in a way that a computer might also carry out.

Therefore, The ability to solve problems in the actual world is computational thinking's greatest advantage.

Learn more about computational thinking  from

https://brainly.com/question/19189179
#SPJ1

See choices of this question below:

The result of computational thinking is a problem broken down into its parts to create a generalized model and possible solutions,

Computational thinking involves the techniques of decomposition, pattern recognition, abstraction, and algorithm development.

Computational thinking is basically synonymous with programming.

Computational thinking is a set of techniques used to help solve complex problems or understand complex systems

Understanding all of the minor details about a problem is critical in computational thinking

Kinoflos are a type of:


A. A lighting wheel that contains red, blue, and green scrims

B. A type of fluorescent soft light

C. Bright overhead incandescent spotlight

D. A type of fluorescent hard light

Answers

Answer:

d a type of ni is the way to go

The python language is not sensitive to block structuring of code.

a. True
b. False

Answers

Answer: False

Resource of Information: Quizlet

The statement "The python language is not sensitive to block structuring of code" is false.

What is python language?

Python is a popular computer programming language used to create software and websites, automate processes, and analyze data. Python is a general-purpose language, which means it may be used to make many various types of applications and isn't tailored for any particular issues.

Python's syntax differs from various other programming languages in that it enables programmers to construct applications with fewer lines of code.

Python uses block structuring and indents for loops, so this is simply untrue. Pressing the tab will indent the code, and anything that is not indented will not be included in the loop. Python is therefore responsive to block structuring.

Therefore, the statement is false.

To learn more about the python language, refer to the link:

https://brainly.com/question/14068778

#SPJ12

Determine if the statement is true or false. Asymmetrical design can be visually balanced from left to right.
True or false

Answers

Answer:

true false asan pala tanong dyan?

It is false that the asymmetrical design can be visually balanced from left to right.

What is asymmetrical design?

Asymmetrical balance is the technique of achieving a sense of balance by using different visual elements of unequal weight on both sides of a composition.

If you understand that symmetrical means that both sides of something are identical, it should be simple to understand that asymmetrical means that the two sides are different in some way.

Asymmetrical objects are irregular and crooked, and do not perfectly match up when folded in half.

Asymmetry is the lack of symmetry or equality between your design's halves. While both halves of a symmetrical design are the same (or similar), both halves of an asymmetrical design are distinct.

Thus, the given statement is false.

For more details regarding asymmetrical design, visit:

https://brainly.com/question/14701136

#SPJ5

1. Create a function called numberGuess. Function numberGuess will first choose a random number in the range 1 to 1000. The number that is chosen is what the user is supposed to guess. Following this, your function should then display the following





The player then types a first guess. The function responds with one of the following:






Your function must not stop asking for guesses until the user has provided a correct solution. Your program should keep telling the player Too high or Too low to help them narrow down the answer. Count the number of guesses the player makes. At the end when the user finally guesses correctly, print Either you know the secret or you got lucky! if the number of guesses were 10 or less. If the player guesses the number in 10 tries, then print Ahah! You know the secret! If the player makes more than 10 guesses, then print You should be able to do better!
-


- I already have some code however not sure if its 100% correct
Please review feedback will appreciated, thanks
#include
using namespace std;

int main()
{
int num, guess, tries = 0;
srand(time(0)); //seed random number generator
num = rand() % 1000 + 1; // random number between 1 and 1000
cout << "I have a number between 1 and 1000"< > guess;
tries++;

if (guess > num)
cout << "Too high!\n\n";
}
while(guess < num);
cout << "Too low!\n\n";
if(10<=guess)
cout << "\nCorrect!either you know the secret or you got lucky" << tries << " guesses!" < {

} if (guess==10){
cout<<" Ahah! You know the secret!"< }
else


{
cout<< "You should be able to do better! ";
cout<< " Would you like to play again? (Y/N)";



}



}

Answers

You can edit this code whatever you want! Good luck.

A paralegal bills a law firm for 19.5 hours of work at a rate of £240 per hour. How much money has the paralegal earned from this job? Include units in your answer.

Answers

The amount of money that this employee (paralegal) has earned from his job is equal to £4,680.

What is an expression?

An expression can be defined as a mathematical equation which is used to show the relationship existing between two or more variables and numerical quantities.

In this exercise, you're required to calculate the amount of money that this employee (paralegal) has earned from his job. Therefore, an expression which can be used to calculate the amount of money that this paralegal staff earned is given by:

Amount of money = Rate × Amount of hours worked

Substituting the given parameters into the formula, we have;

Amount of money = 240 × 19.5

Amount of money = £4,680.

Read more on expressions here: brainly.com/question/17361494

#SPJ1

which common design feature among instant messaging clients make them less secure than other means of communicating over the internet?

Answers

Peer-to-peer networking is the common design feature among instant messaging clients make them less secure than other means of communicating over the internet.

A straightforward computer network is a peer-to-peer network. It was created for the first time in the late 1970s. Within this network, each computer serves as a node for file sharing. There is no central server in the network because each node acts as a server in this case. This makes a tremendous amount of data sharing possible.

Each node receives an equal share of the tasks. Each linked node in the network has an equal share of work to do. Each node must stop functioning for the network to cease to exist. This is so that each node may function independently.

These networks often have less than 12 nodes, which is not a very large number. Although each machine in the network stores its own data, the entire group has access to it.

Peer-to-peer networks, in contrast to client-server networks, both use and provide resources. If the quantity of nodes rises, more resources are needed. Software specifically for this is needed. It enables network-wide resource sharing.

The nodes serve as both clients and servers, therefore an assault is always a possibility. Peer-to-peer networks are supported by almost all OS today.

To know more about peer-to-peer click on the link:

https://brainly.com/question/10571780

#SPJ4

5. From the following risks of BYOD (Bring Your Own Device), which one is the most
important for an Employee * (1 Point)
O Technical challenge of connecting to Wifi
O Privacy and confidentiality of 'personal information
Data Breach
Sharing resources like printers

Answers

Answer:

B

Explanation:

you can easily fix a bad connection, but getting other people's data breach is a serious violation.

Do you know how many regular people are making 2k a day with 100% commissions?

Answers

Answer:

Depending on your job role, your commission may subsidize your paycheck or be dependent on it. Meaning you either have a base salary and earn extra money through bonus schemes or incentives, or you must make sales if you want to receive a paycheck at the end of the month.

Write a program that receives a series of numbers from the user and allows the user to press the enter key to indicate that he or she is finished providing inputs. After the user presses the enter key, the program should print the sum of the numbers and their average.

Answers

The program that receives a series of numbers from the user is:

theSum = 0.0

# stores the number of terms entered by the user

n = 0

# loop until user presses the enter key

# infinite loop

while True:

# get user input from user

data = input("Enter a number or press Enter to quit: ")

# if user presses enter

if data == '':

# break out of the loop

break

# convert data into float using float()

number = float(data)

# add the entered number to theSum

theSum += number

# increase the number of terms

n += 1

print()

print("The sum is", theSum)

# if numbers of terms entered are greater than 0

if n > 0:

# calculate average

average = theSum / n

print('The average is', average)

# if no terms are entered

else:

print('Average : undefined (as the number of terms entered are 0)')

What is a program?

A computer program is a set of instructions written in a programming language that a computer is supposed to obey.

Computer programs are one of the intangible components of the software, which also includes documentation and other components. The version of a computer program that humans can read is called the source code.

Learn more about program on;

https://brainly.com/question/23275071

#SPJ1

Hello Can someone help me with this problem?
Bob and Alice want to send each other secret messages that no one else will have access to. They have decided that they will use a locked box to hold the secret messages, and they will drop the box off in each other’s mailboxes. The problem is that if they use a combination lock, they will have to send the combination to the box and someone might intercept it. Here are the materials they have access to:
A box that can be locked with a combination lock
Two combination locks (the kinds that click shut that you might use on a school locker)
Paper
Pencil
Describe a protocol Bob and Alice can set up to deliver these messages securely.

Answers

Explanation:

Bob and Alice could first send each other their open locks. Then, e.g., Alice can send a message to Bob and lock her box with Bob's lock, and vice-versa.

A more real-world approach to this problem is that they use a form of Diffie-Hellman approach to exchange a combination for the lock.

Diffie-Hellman is an algorithm where you can exchange secrets even if you know someone is intercepting each and every message you exchange. It's a bit mathematical, but still very cool.

what word is used today to refer to network-connected hardware devices?

Answers

The word used now to refer to it is endpoint.

The word that is used today to refer to network-connected hardware devices is an endpoint device.

What is an endpoint device?

Any device that is physically an endpoint on a network is referred to as an endpoint. Endpoints include desktop computers, laptops, mobile phones, tablets, servers, and virtual environments.

The desktop, laptop, or smartphone that the antivirus is installed on is the endpoint when one thinks of a traditional home antivirus.

On a TCP/IP network, an endpoint device is a piece of hardware with Internet access. In addition to printers and thin clients, the phrase can also be used to describe point-of-sale (POS) terminals, smart meters, smartphones, tablets, thin clients, and laptops.

Therefore, an endpoint device is a term used today to describe hardware components connected to a network.

To learn more about endpoint devices, refer to the link:

https://brainly.com/question/24768005

#SPJ12

if you delete a shortcut from your desktop, have you also deleted the original file?

Answers

I don’t think so. When you delete a shortcut, it’s deleting the way to get there faster and not the file itself. To delete the original file, you would have to go directly to it or delete. Also make sure to delete it permanently if you want, because after you delete it there tends to be an option where you could bring it back, unless the device actually tells your the file is going to be deleted permanently the first time.

concept of online storage

Answers

Answer: The Cloud

Explanation: The cloud is some close or far-off server that stores your data on WAN  and it goes on from here to Timbuktu and beyond. You pay a storage fee of a few dollars and month or a yearly fee of up to 300 bucks ..or more. has it as does another well know Web Browser  and a plethora of other companies .. problem is when you use these cloud drives on your computer your data is still stored on your computer as all as the drive ...Try to add on the web app and not the desktop app...

1. Your employer is opening a new location, and the IT director has assigned you the task of calculating subnets for the new network. You’ve determined that you need 50 subnets for the class B network beginning with the network ID 172.20.0.0. how many unused subnets will be waiting on hold for future expansion? How many possible hosts can each subnet support?

Answers

14 subnets that are unused will be waiting on hold for future expansion.1022 possible hosts can each subnet support.

What is subnets?

A subnetwork, also known as a subnet, is a logical division of an IP network. Subnetting is the practise of dividing a network in to the two or more networks. Computers on the same subnet are addressed in their IP addresses with the same most-significant bit-group. As a result, an IP address is logically divided up into two fields: the network number or routing prefix and the rest field as well as host identifier. The rest field identifies a particular host or network interface.

After subnetting, we have 16+6 = 22 network and 16-6=10 host bits.

No. of unused subnets = 2^6-50 = 14 subnets

No. of hosts. per each subnet =2^10-2 = 1022 hosts.

To learn more about subnets

https://brainly.com/question/28256854

#SPJ9

What is the difference between symbolic addressing and absolute addressing? Which addressing is easier to understand

Answers

Symbolic addressing varies from Absolute Addresses in that they specify relocatable addresses by either utilizing an emblem as the label in the name field of an assembler code statement or equating a symbol to a relocatable expression. Absolute addressing (or values) are obtained by equating a marker to an absolute expression.

What is a symbolic address?

A symbolic address is associated with a program symbol or a symbol defined by the Equate subcommand. The topic of certified symbolic addressing is covered further down. See Restrictions on the Use of Symbols for a more thorough explanation.

In memory management, the compiler binds symbolic addresses from the source program on disk to relocatable locations (which are the instruction addresses relative to each other). The linker then associates the relocatable address with absolute addresses (which are the physical addresses allocated in key memory).

The contents of a register reflect an absolute address. The contents of a register reflect an absolute address. In the sense that it is not stated relative to the present instruction address, this addressing method is absolute.

Learn more about addressing:
https://brainly.com/question/28769221
#SPJ1

how do you delete your account when you forgot your password?! lol

Answers

Answer: okay if you remember the email you used, even if you logged in through goooooooooogle, just put the email and say forget the password. They will ask if you'd like to send a verification code to your email to change your password. Click yes. Go to your email change the password then use it to log in once again to your account.

Explanation:

Consider photographing a football stadium fully lit with stadium lights compared to
a football stadium lit by nothing but candlelight. What is the main difference
between these two lighting situations?
(1 point)
O the light intensity
O the light quality
O the shadow of the light
O the position of the light

Answers

The main difference between these two lighting situations is: A. the light intensity.

What is a photoshoot?

A photoshoot simply refers to a photography session which typically involves the use of digital media equipment and lighting equipment, to take series of pictures (photographs) of models, group, things or places, etc., especially by a professional photographer.

What is light intensity?

Light intensity can be defined as a measure of the rate at which light radiates over the surface of an area such as a football stadium, with respect to the distance from a source. This ultimately implies that, the unit of measurement of light intensity is Watts per steradian (W/sr).

In conclusion, light intensity is simply a difference between a fully lit area and a partially lit area.

Read more on light intensity here: https://brainly.com/question/28145811

#SPJ1

Answer: A.) light intensity

Explanation: edge 2023

You are the new IT admin of Sherpa Logistics. The company's in-house application is showing some aberrant behaviors and your team lead has asked you to handle the situation in his absence. What would be your first point of action in such a scenario?

Answers

The first action in such a scenario would be to Troubleshoot the software. This will yield insight into what the issue is and give more understanding of the problem.

What are the steps to solving a software problem?

In general, fixing a software challenge may be separated into four steps:

Determine the issueObtain informationIterate on possible solutions.Try out your solution.

A problem does not always manifest itself with flashing red lights—the software simply does not perform as expected.

Even if this is the case, you should do your best to describe the issue. Ask yourself (and perhaps write down your replies) the following questions:

What am I attempting to accomplish?What have I already done?What do I believe the program should accomplish?What exactly is it doing?

Learn more about software problems:
https://brainly.com/question/13533992
#SPJ1

Some one please help me​

Answers

The Computer Networking Topology indicated above is called the Star Topology. While the Connecting Devices are:

Modem (Direct Connection to the Internet)Switch (Connects the internet to other devices via Lan and via the wireless router)

What is a Computer Network Topology?

The layout of the elements of a communication network is referred to as network topology. The term network topology refers to the layout of several forms of telecommunication networks, such as command and control radio networks, industrial field busses, and computer networks.

Physical things that can communicate with one another and other systems through the internet are referred to as connected devices. They range from classic computer gear like a laptop or desktop to typical mobile devices like a smartphone or tablet to an ever-expanding spectrum of physical devices and things.

A central hub or switch serves as a type of intermediary for data transfer in a star architecture. When seeking or supplying communication, each network device enlists the central hub.

Star topologies are simple to debug and scale since one broken node does not affect the others. For this architecture to function properly, the centralized device must constantly be in good working order.

Learn more about network topology:
https://brainly.com/question/13163014
#SPJ1

converting 13975 from decimal number to binary format​

Answers

13975 from decimal to binary is 11011010010111.

1. Manny would like to design a flier for his new restaurant advertising their new
weekly specials. Which of the following programs should he use to complete this
task?
A. Microsoft Word
B. Microsoft
Publisher
C. Microsoft PowerPoint
D. Microsoft Excel

Answers

Since Manny would like to design a flier for his new restaurant advertising their new weekly specials, the software program which he should use to complete this task is: B. Microsoft Publisher.

The Microsoft Office package.

Generally speaking, the Microsoft Office comprises different software applications and these include the following:

Microsoft PublisherMicrosoft Word.Microsoft PowerPoint.Microsoft Excel.Microsoft AccessMicrosoft Project

What is Microsoft Publisher?

Microsoft Publisher can be defined as a desktop publishing software application or program that is designed and developed by Microsoft Inc.,  in order to avail its end users an ability or opportunity to work on page layout and graphic design such as a flier.

Read more on Microsoft Publisher here: https://brainly.com/question/26717262

#SPJ1

Answer:

D. Microsoft Excel

Explanation:

three transformations are available when you right-click a column header in the Query Editor window?

Answers

The three transformations are available when you right-click a column header in the Query Editor window are:

RemoveChange TypeDuplicate ColumnWhat is a query editor window?

You may edit and run queries using the Query Window, a fully featured editing environment. A few of the features the editor offers are listed below: editing with drag and drop. Automatic syntax highlighting and brace matching

What purposes does the query editor serve?

Power Query Editor is a component of Power BI Desktop as well. Connect to one or more data sources using Power Query Editor, then shape and manipulate the data to suit your needs before loading the model into Power BI Desktop.

How can you build a query editor?

The query you want to open should be double-clicked. Then, right-click the selected area and select Design Query in Editor from the menu that appears.

To know more about query editor window visit:

https://brainly.com/question/27960642

#SPJ10

I understand that the question you are looking for is:

Which 3 transformations are available when you right click a column header in the Query Editor window?

You have a customer who is having issues with their
computer audio, What do you have them check first?*

Answers

Answer:

Explanation:

What is the Product Rule of Exponents?When multiplying two numbers with the same base, their powers/exponents would be added.For example, .Given:(a²c)³Therefore:(a²c)³ = (a²c)(a²c)(a²c) (a²c)³ = (a²c)³ = Therefore, applying the product rule of exponents, (a²c)³ = .

susan wants to bring out as much tone and shading in her prints as possible what type of paper should she use

Answers

Since Susan wants to bring out as much tone and shading in her prints as possible, the type of paper that she need to use is Strathmore Toned papers.

What effect does value shading have on a piece of art?

Value is employed to simulate the appearance of highlights and shadows. The illusion of a light source is produced by the interaction of highlights and shadows.

Tone can be a key instrument for generating contrast in an artwork by establishing a sense of antagonism and tension between various elements or by drawing attention to certain areas of the composition.

Your speed increases on a toned surface. more approachable than a white paper. minimize glare when it is sunny. stronger compared to several other art paper varieties. come in a huge range of hues.

Therefore, In a sketchbook, artists would record the images that served as their sources for larger, more complex paintings.

Learn more about shading from

https://brainly.com/question/25729154

#SPJ1

Which of the following measures the amount of substance?

candela
kilogram
ampere
mole

Answers

The measure of the amount of substance is the mole. The correct option is d.

What is the amount of substance?

The mole, denoted by the sign MOL, is the SI unit for measuring the amount of a substance made up of a particular elementary particle. Examples are an atom, molecule, ion, electron, or other particle or a specific set of particles.

Calculating the amount of any material is done using the mole, a SI unit of measurement.

Therefore, the correct option is d. mole.

To learn more about the amount of substance, refer to the below link:

https://brainly.com/question/20486415

#SPJ1

Beth wants to start multimedia business in 3D modeling and sound integration and editing. She should invest in____ for 3D modeling and____ for sound editing.

Answers

Beth wants to start a multimedia business in 3D modeling and sound integration and editing. She should invest in Adobe Substance 3D Modeler for 3D modeling and Adobe Audition for sound editing.

What is 3D modeling?

3D modeling is a method in 3D computer graphics that involves manipulating edges, vertices, and polygons in a simulated 3D environment to create a mathematical coordinate-based depiction of any surface of an object in three dimensions using specialist software.

3D modeling may be applied almost anywhere. We know it's popular in film, video games, and animation, but that's not all. From architecture to mechanical engineering to the medical business, all of these demanding industries are finally realizing and capitalizing on the full potential of 3D modeling. 3D modeling may be beneficial in a variety of ways.

3D modeling may be classified into the following categories:

Solid modeling is used to create three-dimensional forms. The forms may differ, yet they function as building blocks when combined. Depending on the input, some of these blocks add material while others delete.

When the surface is complicated and curved, wireframe modeling might be useful. You'll eventually discover that the fundamental building blocks of solid modeling are too obtuse for some applications, while wireframe modeling gives the refinement for more complicated designs.

The next level of complexity is surface modeling. Smooth surfaces and flawless integration are required for highly professional applications, which may be handled by more complicated programs that need more labor and computational capacity.

Learn more about 3D modeling:
https://brainly.com/question/820276
#SPJ1

Answer:

An animation tool

a sound editing tool

Explanation:

Just took the quiz and got it right.

There are.
A. 40
B. 20
C. 65
D. 15
questions on the Aspire science test.

Answers

A - The Science Aspire test is composed of 35 multiple choice and 5 constructed response questions.

A.40 questions on the Aspire science test.

Other Questions
When a plant asset is retired, the difference between the plant assets cost and the accumulated depreciation of the same plant asset is. Armand plans to save money every month for the next six months. The function f(x)=2x1 represents the amount of money, in dollars, Armand will deposit into his savings account at the end of x months since the time he started saving. Which of the following represents the amount of money, in dollars, Armand deposits into his savings account at the end of 3 months since the time he started saving? Select all that apply. Responses f3f times 3 f(3)f of 3 3f(x)3 f x 2312 cubed minus 1 3(2x1)3 times open paren 2 to the x th power minus 1 close paren compare and contrast the flow of blood through the circulatory system and the flow of air through the respiratory system. describe at least one key similarity and one key difference. altruistic behavior: a. is behavior that benefits others while causing a disadvantage to the individual. b. occurs only between primates that are not relatives. c. is not a beneficial evolutionary adaptation. d. is not an advantage of competition within a society. Please please please help Im dialing Write another valid congruency statement: A car of mass 1200kg travels at a steady speed of 22ms around a bend of radius 50m.find the centripetal force required - School is 2 miles from home along astraight road. The table shows yourdistance from home as you walk homeat a constant rate. Give the constant of proportionality as a decimal.Time (min)= Distance from home (mi)10 min =1.5 miles20 min= 1 mile30 min= 0.5 miles The Triple Alliance and Triple Entente were formed through the signing of Draw a line representing the "rise" and a line representing the "run" of the line. State the slope of the line in simplest form.Please use a picture to show where they are plotted if you can. Solve for b and graph the solution.5=1b-51 can you explain what the green arrow is pointed at owen made a scale drawing of a city. in real life a neighboorhood park is 170 yards long. it is 17 inches long innthe drawing. what scale did owen use for the drawing1 inch : ____ yards What social impact did the conquistadors hope to have on the Indians granted to them as encomiendas? How did Fordism affect American labor? Factorise 12x raise to power of 2 and y raise to power of 2 +11xy-5 Anyone, help me plss Stock on the new york stock exchange opened at 52$ on Monday morning. The table shows the store's value change for each day that week. What was the stock worth at the close of business on Friday? Which statement is trueA)Only graph A is a function B)Only graph B is a function C)Both graphs are functions D)Neither graph is function What would be the appropriate response to the following question:Cundo es tu cumpleaos?Tengo en agosto 15.O Soy el 15 de agosto.O Es el 15 de agosto.O Hoy es lunes el 15 de agosto. Which of the following barriers to communication is an example of selective perception?a. Something blocks, changes, or distorts the message.b. A message isn't decoded the way the sender intended it.c. The message is seen and heard based on expectations.d. Information is intentionally withheld, ignored, or distorted.