1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna007 [38]
3 years ago
10

The _____ stage of information technology planning outlines business processes that are central to achieving strategic goals and

helps determine which ones could most benefit from information technology. a. resource allocation b. information technology strategy planning c. project planning d. business area analysis
Computers and Technology
1 answer:
bija089 [108]3 years ago
3 0

Answer:

d. business area analysis

Explanation:

Business area analysis is the stage of information technology planning outlines business processes that are central to achieving strategic goals and helps determine which ones could most benefit from information technology.

Here the major focus is on planning the outlines required to achieve the central objective of business.

It outlines all the business process, the goals and helps to determine the most benefit from information technology.

You might be interested in
Which of the following is a true statement? a. To have the computer close the current form when the user clicks the Exit button,
Svet_ta [14]

Answer:   a)To have the computer close the current form when the user clicks the Exit button, the Me.Close() statement should be entered in a button’s Click event procedure

Explanation: Me.close() statement is used for the assuring that execution of the program has stopped along with stopped computer event.This statement is puts the current form into the form.closing.

Other statements are incorrect because title bar can be vanished from application,size of the form can be change while execution of application and both minimize and maximize button are in the form of set and can be removed togather only .Thus, the correct option is option(a)

8 0
3 years ago
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most preci
Slav-nsk [51]
The containment strategy prevents intruders from removing information assets from the network, and prevents attackers from using the organization's network as a launch point for subsequent attacks.
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most precise strategy possible, starting with <span>blocking a specific IP address. Correct answer: C

</span>

8 0
3 years ago
Using C++Chapter 6 - Programming Challenge 24 - Rock Paper Scissors GameMake sure you use at least one function to make your cod
olganol [36]
You might send me the picture of it because I think it’s $45
8 0
3 years ago
Word provides rulers along the bottom and right margins to help you as you format your documents is true or false?
Ainat [17]
The answer to your question is True.
4 0
3 years ago
Suppose there is exactly one packet switch between a sending user and a receiving user. The transmission rates between the sendi
Paha777 [63]

Answer:

L(\frac{1}{R_1}+\frac{1}{R_2}  )

Explanation:

R_1 is the transmission rates between the sending user and the switch while R_2 is the transmission rates between the switch and the receiving user and the length of the packet is L

Considering no propagation delay the time taken to transmit the packet from the sending user to the switch is given as:

t_1=\frac{L}{R_1}

the time taken to transmit the packet from the switch to the receiving user is given as:

t_2=\frac{L}{R_2}

therefore the total end-to-end delay to send a packet is:

t=t_1+t_2=\frac{L}{R_1}+\frac{L}{R_2} =L(\frac{1}{R_1}+\frac{1}{R_2}  )

6 0
3 years ago
Other questions:
  • Where should fire extinguishers be stored on a boat?
    7·1 answer
  • When did project management first emerge as a profession
    6·1 answer
  • Output from the print statement is usually written to the ______ in the form of ________
    6·1 answer
  • Andrew will use the _____ picture option to add a new image. ??
    15·2 answers
  • _____ are networks that learn and are capable of performing tasks that are difficult with conventional computers.
    11·1 answer
  • Write a while loop that prints
    13·1 answer
  • What computer programs can you work with to present and post your e-portfolio on the Internet?
    11·1 answer
  • Create a new Java class called AverageWeight. Create two arrays: an array to hold 3 different names and an array to hold their w
    13·1 answer
  • Write a program that assigns values to
    15·1 answer
  • 6.1.5: Function definition: Volume of a pyramid.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!