1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tangare [24]
2 years ago
12

What does business informWhat does business information management do?

Computers and Technology
1 answer:
Pani-rosa [81]2 years ago
7 0

Answer:

B) identify information requirements for different management levels

Explanation:

Business information management is based off of identifying the needs of a company. (This is also a plato answer)

You might be interested in
Yo who do u add a pic on here
Juliette [100K]
Go to the me colum when you first open the app
8 0
3 years ago
Which phrase describes a dependent cell in Excel 2016? a cell that feeds data into another cell a cell that has data fed into it
vovangra [49]

Answer:

a cell that feeds data into another cell

Explanation:

The dependent cell means the cell which refers to another cell.

Just take an example

If cell c15 involves the formula = B10

So c15 is being dependent on cell b10

For reaching this we visit to formulas section after that dependent and precedent occurs

So according to the given options, the first option is correct

4 0
4 years ago
You areYou are a member of the application development organization for a small but rapidly growing software company that produc
bija089 [108]

Answer:

Following are the solution to this question:

Explanation:

Please find the complete question in the attached file.

It will obtain as much information about this matter as necessary even before the conference. It includes its gravity or probability of risk, various cases in the entire event, the possible solutions to the issues, as well as the consequences for parties involved in each potential answer, and Only at conferences, it may clarify to my boss that the explanation for the problem and also in details. It will be doing everything possible and try not to conceal the details but highlight the problem.

3 0
3 years ago
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
svetoff [14.1K]

Answer:

Session hijacking

Explanation:

Session hijacking : Session hijacking is an attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out.

5 0
3 years ago
The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is perfo
joja [24]

Answer:

True

Explanation:

Firmware are software programs embedded in hardware devices such as hard drives and BIOS, that allow these hardware devices to run properly. With the help of firmware, user programs can run on devices. Firmware programs hardly change throughout their lifetime except and upgrade is performed on them. Firmware are usually upgraded to fix bugs and maybe to add new features to them.

Examples of firmware are;

(i) programs written for a printer

(ii) software controlling the time in a washing machine.

8 0
3 years ago
Other questions:
  • what notation system supports presenting the largest numbers using fewest digits; Binary, decimal or hexadecimal?
    11·1 answer
  • 1.Which of the following class definitions defines a legal abstract class?a. class A { abstract void unfinished() { } }b. class
    7·1 answer
  • When using a function to preform a calculation how would you select the range of numbers to use
    13·1 answer
  • What do mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud co
    15·1 answer
  • Hai<br> ill give 100 point if some won answers dis
    14·2 answers
  • Adding Calculator Write a program that simulates an adding machine. Input to the program will be integers, submitted one per lin
    15·1 answer
  • a 50.5 force is applied to a golf ball generating an initial acceleration of 15 m/s2 caculate the mass of the golf ball.
    11·1 answer
  • Edhesive Assignment 11
    8·1 answer
  • What are the pros and cons for E-trade?
    15·2 answers
  • Write a python program to check whether the number is divisible by 7. If its divisible, print its divisible otherwise find previ
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!