answersLogoWhite

0

It takes centralized decisions. It emphasis direct supervision and personal leadership founded upon ownership, charisma, or technical expertise. It uses reward and punishment to reinforce conformity to personal authority.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What is the definition of centralized computing system?

Computing done at a central location. (:


Advantages and disadvantages of Network Tapologies?

centralized control


What type of network has no centralized authority or control?

Peer-To-Peer


What is the individual legal definition of "privacy"?

The individual legal definition of "privacy" refers to the right of individuals to control their personal information and to be free from unwanted intrusion or interference by others.


Definition of internal control by different authors?

definition of control


Why are servers are called personal computers?

A server is not a personal computer but a centralized system for data storage. A personal computer is usually one hard drive and a monitor.


When was centralized traffic control first used?

The first installation of the General Railway Signal Corp. centralized traffic control (shown as cTc) was in 1927 on a 40 mile section of the New York Central railroad in Ohio.


What is the definition of personal standards?

By meeting your standards that are personal.


Definition of personal identity?

Personal Identity is the personal characteristics of someone that makes them a person at any given time under the definition of personhood.


What is the legal definition of care custody and control?

Legal definition of care, custody and control?


What means centralized treasury?

concerntration or control of something valuable or a valuable position in something


Why is a clientserver network better than a peer-to-peer network?

A client-server network better than a peer-to-peer network because it allows centralized control. This includes centralized user management and enforcement of centralized security measures.

Trending Questions
What are the key factors that were or should have been considered by management? An individual must be willing to accept the level of risk his or her supervisor assigns? Before you can use time management strategies to organize your time you have to? How can we incorporate the Fibonacci sequence into our Scrum story points estimation process? Can you provide a smart analysis example to illustrate the effectiveness of your approach? What are the step 5 of the RM process to ensure compliance with the guiding principles except? If a company were changing over to a project management structure would it be better to promote and train from within or hire from the outside? What are the key differences between a management consultant and a business consultant, and how can their respective expertise be leveraged to enhance organizational performance? Where do you find a solution for workforce management issues? An example of decision making in college is? What do you means DataBase Management System? What are the critical risks and contingencies in a business plan? What are the key differences between BRD (Business Requirements Document) and FRD (Functional Requirements Document)? What is the use of health care management? How do on duty leaders supervise compliance with hazard control during an operation in risk management? Definition of professional management? What is decision making units? What is the Difference between project Risk and project Dependency? Why do you think comparative management is important in today's international scenario? What are the major components of the risk management process and what happens in each stage?