Which feature of an executive information system (EIS) enables users to examine and analyze information? case of use intelligent agent secure login digital dashboard

Answers

Answer 1

The feature of an Executive Information System (EIS) that enables users to examine and analyze information is the digital dashboard. Option D

What is a digital dashboard?

A digital dashboard is a graphical user interface that displays important business data and key performance indicators (KPIs) in real-time.

It provides executives with a visual representation of the data, allowing them to quickly and easily identify trends, patterns, and anomalies.

Additionally, the use of intelligent agents and secure login adds an extra layer of security to the EIS, ensuring that only authorized users can access the system and its data.

Read more about digital dashboard at: https://brainly.com/question/28014965

#SPJ1


Related Questions

When a device or service causes the system to hang during a normal boot, boot into __________ and disable the device or service

Answers

You should boot into safe mode and disable the device or service when it causes the computer system to hang during a normal boot.

What is safe mood?

Safe mood can be defined as a boot option in which the operating system (OS) of a computer system starts in diagnostic mode rather than in a normal operating mode, so as to enable the user correct any problems preventing the computer system to have a normal boot.

This ultimately implies that, safe mood is a diagnostic mode of the operating system (OS) of a computer system that is designed and developed to fix most problems within an operating system (OS) and for the removal of rogue software applications.

Read more on safe mood here: https://brainly.com/question/13026618

Drag the tiles to the correct boxes to complete the pairs.
Match the effects with the result they have.
silky blur
grainy BMW effect
soft focus
zoom effect
blurs an image while maintaining sharp edges
simulates flow of water
shows motion lines around the main object
obtains a darker, textured finish

Answers

Silky blur::shows motion lines around the main objectgrainy BMW effect:-obtains a darker, textured finishsoft focus:-blurs an image while maintaining sharp edgeszoom effect:-simulates flow of water

Done

Answer:

1 : blurs an image while maintaining sharp edges = soft focus

2:  simulates flow of water = silky blur

3: shows motion lines around the main object = zoom effect

4:  obtains a darker, textured finish = grainy B/W effect

Explanation:

Drag the tiles to the correct boxes to complete the pairs.Match the effects with the result they have.silky

Which fine arts field might someone who loves travel enjoy? O watercolor painting O travel photography O food blogging O hotel management​

Answers

Answer: Watercolor Painting

Explanation:

Answer:

Explanation:

Travel photography

A standard method for labeling digital files is called a file-labeling what? question 5 options: protocol tool setting configuration

Answers

A standard method for labeling digital files is called option A: file-labeling protocol.

What are three file naming conventions?

An outline for naming your files in a way that pass out  their contents and their relationships to other files is known as a file naming convention. File naming conventions make it simpler to recognize your files and help you stay organized. You can discover what you need quickly by constantly arranging your files.

Therefore, the three file naming patterns are;

Dashes (e.g. file-name. yyy) (e.g. file-name. yyy)No division (e.g. filename. yyy )Camel case, which capitalizes the initial letter of each block of text (e.g. File Name. yyy )

Learn more about file-labeling from

https://brainly.com/question/21440135
#SPJ1

Answer:

protocol

Explanation:

TOOK THE TEST 6.03 quiz 7th grade

Write a c program that uses iteration to find the sum of all multiples of 3
and all multiples of 4 between 3 and 150 inclusive. Print the sum.

Answers

#include<stdio.h>

int main()

{

int sum_3=0, sum_4=0; //Variable to store the sum of multiples of 3 and 4

for(int i=3; i<=150; i++) //Iterating from 3 to 150

{

if(i%3==0) //Checking if i is a multiple of 3

sum_3 += i; //Adding i to the sum of multiples of 3

if(i%4==0) //Checking if i is a multiple of 4

sum_4 += i; //Adding i to the sum of multiples of 4

}

printf("Sum of multiples of 3: %d\n", sum_3); //Printing the sum of multiples of 3

printf("Sum of multiples of 4: %d\n", sum_4); //Printing the sum of multiples of 4

return 0;

}

1.Which one of the following buttons returns a window to its original size?

A.
Maximize button

B.
Close button

C.
Minimize button

D.
Restore button
2.What is the name used to identify the pointer that is controlled by the mouse?

A.
Alert

B.
Boot

C.
Cursor

D.
Drag
3.What is the process called when information from your computer is transferred to another computer?

A.
Upload

B.
Copy

C.
Transfer

D.
Download
4.Which one of the following indicates a file's format?

A.
Icon

B.
Extension

C.
Platform

D.
Driver

5.What term refers to a single directory that can hold a collection of files? A. Platform B. Folder C. Extension D. Icon
6.6.
What term refers to a single directory that can hold a collection of files?

A.
Platform

B.
Folder

C.
Extension

D.
Icon
7.What is the common term used to describe a single computer document?

A.
Driver

B.
File

C.
Screenshot

D.
Icon
8.
What is the main piece of computer software on which every other piece of software relies?

A.
Desktop

B.
Operating system

C.
Database

D.
Driver
BUT DOES ANYONE HAVE AL 20 ANSWERSSSSS I'LL MARK YOU THE BRAINLIEST PLEASEEEE HELPPPP

Answers

Answer:

1. D

2.C

3. D

4. A

5. B

6.B

7.B or D

8.C

Explanation:

Not 100% sure about 3,4, 8

Which of the following is an example of group dynamics?

Answers

Answer:

Examples include mechanisms for dealing with status, reciprocity, identifying cheaters, ostracism, altruism, group decision, leadership, and intergroup relations. i hope i helped :)

Answer:

D. All of the above

Explanation:

Just took the quiz

The mouse, keyboard, and speakers are some of the things that would be plugged into _____ on the back of the system unit

Answers

Answer:

USB PORT are on the back on the system case

What does we are caught in an inescapable network of mutuality mean?

Answers

"We are caught in an inescapable network of mutuality" is a quote from Martin Luther King Jr.'s Letter from Birmingham Jail. In this letter, Dr. King uses the phrase to emphasize the interconnectedness of humanity and the way in which our actions and decisions impact others.

Essentially, Dr. King is saying that we are all connected to one another, and that what affects one person ultimately affects us all. This interconnectedness means that we cannot simply live for ourselves and ignore the needs and well-being of others. Instead, we have a responsibility to work towards the common good and strive for justice and equality for all.

Dr. King uses the metaphor of a garment to illustrate this idea, saying "In a real sense all life is inter-related. All men are caught in an inescapable network of mutuality, tied in a single garment of destiny. Whatever affects one directly, affects all indirectly."

This concept of interdependence and interconnectedness is a fundamental aspect of many social justice movements and serves as a reminder that our actions and decisions have consequences beyond ourselves.

will i3 pull 3220

and 6 GB of RAM windows 10 without lags?

Answers

It is to be noted that a Core i3 CPU (or processor) with 6GB of RAM running Windows 10 will most certainly be able to run without noticeable delays. However, the performance of the system will be determined by the exact tasks and apps that you will execute on it.

What is a Core i3 Processor?

An i3 CPU is a low-end processor that will struggle to handle intense workloads or high-end games, but it should do simple activities like web surfing, word processing, and video playback without trouble. 6GB of RAM is also considered a little amount of memory; it may not be enough to run numerous apps at the same time, or to run heavy applications such as video editing software, but it should be plenty for simple activities.

It's crucial to remember that a computer's performance is influenced by numerous variables other than the CPU and RAM. Other elements, like as the storage drive, graphics card, and cooling system, can all contribute to the total system performance.

Learn mroe about processors:
https://brainly.com/question/28255343
#SPJ1

PLEASE HELP
Which of the following will result in the answer to 12 divided by 2?
A-print(12/2)
B-print(12*2)
C-print 12/2
D-print 12./.2

Answers

Answer:

Explanation:

B,D are not correct

What are some positive and negative impacts of computer science changing how we work, where we work and when we work?​

Answers

Answer:

Using those tools, computer science allows us to predict hurricanes, tornadoes, or even the outbreak of a potentially fatal disease. It can even be used to predict human behavior, which can help prevent crimes. Computer science can provide us with some life-saving tools and work.

Explanation:

_____ often enters a computer through free online downloads.

Answers

The correct answer is Viruses can reach your computer through picture, greeting, or audio/video attachments. Internet downloads are another way that viruses infect a system.

A harmful piece of computer code created to transfer from one device to another is known as a computer virus. These self-copying threats, a kind of malware, are frequently made to harm a device or steal data. Consider a biological virus, the sickening variety. Typically, computer viruses are spread by plugging in infected hardware, such as an external flash drive, or by malicious web downloads and email attachments (USB stick). As long as the virus can evade detection by antivirus software, it can spread through nearly any means of file sharing. The virus can, however, spread to other computers connected to the same network once it has infected yours.

To learn more about Viruses  click on the link below:

brainly.com/question/29353096

#SPJ4

Question 7a data analyst is working with product sales data. They import new data into a database. The database recognizes the data for product price as text strings. What sql function can the analyst use to convert text strings to floats? fill in the blank: refers to the process of converting data from one type to another

Answers

The e CAST function refers to the process of converting data from one type to another

What is the sql function about?

The SQL function that the accountant can use to convert text successions to floats is "CAST". The analyst can use the CAST function to convert the manual string data to buoyant point numbers that can be secondhand in calculations.

The process of adapting data from individual type to another is known as "dossier type conversion" or simply "type change". Type conversion is a ordinary task in data study and database administration, as different dossier types are often used for various purposes and in different plans.

Learn more about sql function from

https://brainly.com/question/29978689

#SPJ1

what factors determine the processing power of a cpu

Answers

The processing power of a CPU is determined by several factors, including clock speed, number of cores, cache size, and architecture.

Clock speed refers to the number of cycles per second that a CPU can execute. Higher clock speeds generally result in faster processing speeds. The number of cores in a CPU determines the number of independent processing units, allowing for parallel execution of tasks. More cores generally lead to better multitasking capabilities and increased performance in multi-threaded applications.

Cache size refers to the amount of high-speed memory built into the CPU. A larger cache can store frequently accessed data, reducing the time needed to fetch information from main memory. CPU architecture also plays a significant role, as different architectures have varying efficiencies and capabilities.

Overall, a combination of these factors determines the processing power of a CPU and its ability to execute instructions and handle computational tasks efficiently.

Learn more about CPU here: brainly.com/question/23931127

#SPJ11

Code example 10-2$(document).ready(function() {$("#member_form").submit(function(event) {var isValid = true;..var password = $("#password").val().trim();if (password == "") { $("#password").next().text("This field is required.");isValid = false; } else if ( password.length < 6) {$("#password").next().text("Must be 6 or more characters.");isValid = false;} else {$("#password").next().text("");}$("#password").val(password);..if (isValid == false) { event.preventDefault(); }});});(Refer to code example 10-2) What does the preventDefault() method in this code do?Question 12 options:a. It cancels the change() event method of the form.b. It cancels the submit() event method of the form.c. It triggers the change() event method of the form.d. It triggers the submit() event method of the form.

Answers

The preventDefault() method in this code (example 10-2) cancels the submit() event method of the form if the validation fails. Therefore, the correct option is (b) It cancels the submit() event method of the form.

The event.preventDefault() method is called when the form is not valid, i.e., when isValid == false. This method is used to prevent the default behavior of the form submission, which is to reload the page or navigate to a new page. By calling event.preventDefault(), the form submission is cancelled, and the user remains on the same page, allowing them to correct any errors in the form.

To learn more about preventDefault click on the link below:

brainly.com/question/30040332

#SPJ11

I know how to do this but I'm struggling to make it appear on the screen am I doing it right? If I am please tell me that if not please tell me and explain to me how to do it also help me to understand by explaining it to me what I'm doing wrong so that in the future I will never ever make this mistake again.

I know how to do this but I'm struggling to make it appear on the screen am I doing it right? If I am

Answers

Answer:

maybe you should try to copy the image then paste it, or save it to your files then go into your files and add it

Explanation:

are digital contract services that require senstive information safe?

Answers

Answer:

Most companies keep sensitive personal information in their files—names, Social Security numbers, credit card, or other account data—that identifies customers or employees.

This information often is necessary to fill orders, meet payroll, or perform other necessary business functions. However, if sensitive data falls into the wrong hands, it can lead to fraud, identity theft, or similar harms. Given the cost of a security breach—losing your customers’ trust and perhaps even defending yourself against a lawsuit—safeguarding personal information is just plain good business.

Some businesses may have the expertise in-house to implement an appropriate plan. Others may find it helpful to hire a contractor. Regardless of the size—or nature—of your business, the principles in this brochure will go a long way toward helping you keep data secure.

How do you open the Clipboard task pane?
a. The Clipboard launches automatically when you copy or cut text.
b. Click the Paste list arrow in the Clipboard group, then click Clipboard.
c. Click the launcher in the Clipboard group.
d. Click the Clipboard button on the VIEW tab.

Answers

By clicking the launcher, the Clipboard task pane will open, allowing you to access and manage your copied or cut items.

To open the Clipboard task pane, you can click the launcher in the Clipboard group. This will open the Clipboard task pane, where you can view and manage your copied or cut items. Alternatively, you can click the Paste list arrow in the Clipboard group and then click Clipboard. Another option is to click the Clipboard button on the VIEW tab. However, it's important to note that the Clipboard launches automatically when you copy or cut text.

So, if you've recently copied or cut something, the Clipboard task pane should already be open. To open the Clipboard task pane, you can follow these steps: c. Click the launcher in the Clipboard group.

To know more about Clipboard visit:-

https://brainly.com/question/7978536

#SPJ11

Please help me solves this for the teen talk string part is the teen tester java page correct

Please help me solves this for the teen talk string part is the teen tester java page correct
Please help me solves this for the teen talk string part is the teen tester java page correct

Answers

Use the replace method:
text.replace(‘.’, ‘!!);
text.replace(‘!’, ‘!!’);
Or go to javadoc for replacing string function.

A nested "if" statement only executes if the "if" statement in which it is nested evaluates to True. True False

Answers

The given statement "a nested "if" statement only has an impact if the "if" statement it is contained within evaluates to True" is TRUE.

What is a nested "if" statement?

The use of nested IF functions, or one IF function inside another, increases the number of outcomes that may be tested and allows for the testing of numerous criteria.

Based on their performance, we wish to assign each student a grade.

Return an A if Bob's score in B2 is greater than or equal to 90.

Only if the "if" statement in which it is nested evaluates to True does a nested "if" statement take effect.

The OR function allows you to test many conditions in each IF function's logical test and returns TRUE if any (at least one) of the OR arguments evaluates to TRUE.

Therefore, the given statement "a nested "if" statement only has an impact if the "if" statement it is contained within evaluates to True" is TRUE.

Know more about the nested "if" statement here:

https://brainly.com/question/14915121

#SPJ4

Which of the following is not a good file-management practice?

A. Create descriptive names for folders and files.
B. Store all of the data files at the top level of the drive to make them easier to find.
C. Remove folders and files when they are no longer needed.
D. Make enough subfolders so that the files in any one folder are readably visible.

Answers

Answer:

B, Store all of the data files at the top level of the drive to make them easier to find.

Explanation:

Your files will be unorganized, and it will actually do the opposite of what you want it to.

Hope this helps!

The following is not a good file-management practice Store all of the data files at the top level of the drive to make them easier to find. Thus the correct option is B.

What is file management?

File management is referred to as a systematic technique that allows an individual to store their valuable data and information in the forms of files and documents in an organised manner to retrieve it properly.

File management is crucial since it keeps the files of an individual orderly. It could make it simpler for them to locate files when they need to utilize them. It is crucial for organizations since it makes it simpler for them to share folders with their staff or customers.

File management allows an individual to store their information with descriptive names for easy access and remove files that are not required.

It also enables to make of subfolders so that the files belonging to separate departments or folders are visible to the reader without creating any kiosk.

Therefore, option B is appropriate.

Learn more about File management, here:

https://brainly.com/question/12736385

#SPJ6

Choose the type of error described.
______ occurs when the result is wrong because of the programmer's mistake, such as multiplying two numbers when they should have been added
______ occurs when you use the wrong punctuation, such as print 'hello' without parentheses
______ occurs when the program starts running, but encounters an error such as trying to divide by zero

A. runtime
B. logical
C. syntax

Answers

Answer:

first scenario: B

second scenario: C

third scenario: A

hope this helps! :-)

Answer:

1.logical occurs when result is wrong

2.syntax occurs when the wrong punctuation is use

3.runtime occurs when program starts running

Explanation:

Default values:
State: Incomplete, Name: Unknown's Bakery
After mutator methods:
State: UT, Name: Gus's Bakery

Answers

First, a fresh instance of the Bakery class is created with default settings. Then, we modify the state to "UT" and the name to "Gus's Bakery" using the set state and set name methods, respectively.

The initial values given to variables or attributes in a programme are referred to as default values. The function Object() { [native code] } method of a class is frequently used in object-oriented programming to set default settings. The function Object() { [native code] } is called and the object's attributes are given their default values when an instance of the class is created. By giving the attributes sensible or widely accepted values, default values can be utilised to streamline the code and eliminate the need for the user to explicitly define the attributes. In the event that no alternative value is given, they can also be utilised as a fallback value. By supplying different values using methods or by directly accessing the object's attributes, default values can be altered.

Learn more about "Default values" here:

https://brainly.com/question/7120026

#SPJ4

By default, tables are sorted in ascending order by this.


What’s the answer?

By default, tables are sorted in ascending order by this.Whats the answer?

Answers

Answer:

Record number

Explanation:

It simply can't be "data type" as there cant be more than one data type in a field. It won't be "primary key field" either as primary keys only set the field as unique. You can test this by changing the primary key to a different field. But for simplicity's sake, I did this experiment for you.

As you can see in the first and second attachments, ID is the primary key, set default by the program.

But when I set Field 8 as the primary key, shown in the third attachment, field 8 doesn't sort, shown in the fourth attachment.

By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?

Answer:

By default, tables are sorted in ascending order by record number.

a newly popular unit of data in the big data era is the petabyte (pb), which is

Answers

A newly popular unit of data in the era of Big Data is the petabyte (PB), which is '10^15 bytes'.

Big data is referred to as the large, diverse sets of information that grow at ever-increasing rates. Big data encompasses the volume of information, the speed at which it is created and collected, and the scope of the data points being covered.  Since big data deals with a large and complex volume of data, it needs measure in petabytes (PB). In the context of big data, a petabyte (PB) is a measure of data storage capacity, which is equal to 2 to the 50th power of bytes. There are 1,024 terabytes (TB) in a petabyte (PB) or 1 million gigabytes (GB), and approximately 1,024 petabytes (PB) make up one exabyte.

You can learn more about big data at

https://brainly.com/question/28333051

#SPJ4

_____styles are added sirectly to an html tag by using the style attributes with the tag

Answers

CSS styles are added directly to an HTML tag by using the style attribute with the tag.

The presentation of an HTML or XML document can be described using the style sheet language CSS (Cascading Style Sheets). HTML or XML documents can add visual styles and layout using CSS styles.

The following are some CSS style examples:

Color is used to change the background or text colour of an element.

The font is used to specify the text's style, size, and family.

To enclose an element in a border, use the border property.

Margin and padding are tools for enclosing an element.

Display - Used to set an element's display property.

Setting the location of an element is done using positioning.

Text: This element is used to set text properties like text-align, text-decoration, and text-transform.

For such more question on CSS styles:

https://brainly.com/question/29580875

#SPJ11

Which word-processing feature provides a quick way to execute commands without using your mouse.

Answers

Keyboard Shortcuts are a word processing function that gives you a quick way to carry out operations without using the mouse. The best choice is B.

A hot key is a key or group of keys on a computer keyboard that, when simultaneously pressed, carry out an action (such launching an application) more quickly than a mouse or other input device. Shortcut keys are another name for hot keys. Hot keys are supported by many operating systems and programs. After clicking to initiate the selection, move the pointer over the desired text while continuing to hold down the left mouse button. Anywhere in the word, click twice. Once the pointer has been moved to the left of the line and has turned into an arrow pointing to the right, click.

The complete question is- Which word-processing feature provides a quick way to execute commands without using your mouse?

Print Preview

Keyboard Shortcuts

Find and Replace

Spelling and Grammar​

Learn more about operating here-

https://brainly.com/question/18095291

#SPJ4

Which command is located in the Action Settings dialog box that allows a user to set a linked or embedded object as a trigger to perform an action? a-Object action b-Hyperlink to c-Run action d-Highlight click

Answers

Answer:

b-Hyperlink

Explanation:

The command that is being described in this question is known as a "Hyperlink", like mentioned this command allows the creator to make a piece of text or object perform a specific action when clicked. Usually this action is taking the user to a specific slide in the PowerPoint presentation or to another website entirely, usually with reference to the word or object that was clicked.

Answer: the answer is Object Action

Explanation:

Just took the test:)

write a Visual Basic program that asks the user to enter their name and then uses a for loop to display their name 1000 times.​

Answers

Answer:

Module Module1

   Sub Main()

       Dim name As String

       Console.WriteLine("Enter your name: ")

       name = Console.ReadLine()

       For i = 1 To 1000

           Console.WriteLine(name)

       Next

       Console.ReadLine()

   End Sub

End Module

Other Questions
What rumors are told about Gatsby at his Chapter 3 party?. 6.6 causes of migration in an interconnected world economic imperialism and new types of transportation led to What would happen to homeostasis in the kangaroo rat's body if it was unable to concentrate urine in its kidneys? A(n) __________ is a unique serial number that identifies each SIM, engraved on the SIM during manufacturing. At 3 P.M, the temperature was 12 degrees Fahrenheit. It then began dropping 2 Fahrenheit every hour for 7 hours. What was the temperature after 7 hours. solve the system of equations 2x+7y=-5 and-x-6y=10 On october 1, 2021, perry corporation signed a 12-month, 8% interest-bearing promissory note for $10,000. Assume that all appropriate adjusting journal entries were made at 12/31. The journal entry required when the note matures on october 1, 2022 would include a debit to interest expense for. Identify the five steps of naturalization how did bill gates use his technology skills in his company? Given that the study manager wants the QC efforts to be focused on selecting outlier values, whose method is a better way of selecting the sample if two events are independent, then their joint probability is a. computed with the special rule of addition b. computed with the special rule of multiplication c. computed with the general rule of multiplication d. computed with bayes theorem indicate whether each statement below is true or false. the keynesian cross model is another name for the aggregate expenditures model. a. mpc=1 Two coherent sources of intensity ratio 1 : 4 produce an interference pattern. The visibility of fringes will be a.1b.0.6c.0.8d.0.4 At July 31, Ivanhoe Company has this bank information: cash balance per bank $8,925, outstanding checks $790, deposits in transit $1,285 and a bank service charge $50. Determine the adjusted cash balance per bank at July 31. rokerageTrade PriceSpeed of ExecutionSatisfaction Electronic TradesScottrade, Inc.3.43.43.5Charles Schwab3.23.33.4Fidelity Brokerage Services3.13.43.9TD Ameritrade 2.9 3.63.7E*Trade Financial2.93.22.9(Not listed)2.53.22.7Vanguard Brokerage Services2.63.82.8USAA Brokerage Services2.43.83.6Thinkorswim2.62.62.6Wells Fargo Investment 2.32.72.3Interactive Brokers 3.744Zecco.com2.52.52.5Firstrade Securities334Banc of America Investment Services412Is the overall regression significant, and what proves that it is or is not?Are the two independent variables (X1 and X2) significant or not?What is the estimated regression equation? Operating leverage is: a) Operating leverage is net income divided by revenues and shows how profitable the company is. b) Companies with low operating leverage are generally preferred. c) Operating leverage is gross margin divided by revenues d) Operating leverage shows the amount of debt a company has on its balance sheet. e) A & B only 2) When conducting financial analysis and looking at the balance sheet the amount of leverage refers to: a) The amount of debt as compared to the amount of shareholders' equity. b) The amount of current liabilities as compared the amount of current assets. c) The amount of shareholders' equity versus the amount of total assets. d) The amount of current liabilities versus the amount of shareholders' equity e) None of the above SolveMake sure to enter your answer as an ordered pair. (x,y) ms. forsythe gave the same algebra test to her three classes. the first class averaged $80\%$, the second class averaged $85\%$, and the third $89\%$. together, the first two classes averaged $83\%$, and the second and third classes together averaged $87\%$. what was the average for all three classes combined? express your answer to the nearest hundredth. Find the equation of the line that contains the point (4, -2) and is perpendicular to the line y = y = -xOy=2x-10O y = -2x+6Oy=x-4- 2x + 8. 1- how we can validate the findings of the project (i.e, excel file)?- Interviewing risk managers of projects with similar nature (Yes or No)- Risk log of projects with exactly similar nature (Yes or No)- Interviewing the sub- contractors of the project (Yes or No)- Interviewing the project stakeholders (Yes or No)