1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xenn [34]
3 years ago
6

Document creation is a key business function because:

Computers and Technology
2 answers:
lorasvet [3.4K]3 years ago
6 0
<span>D. it allows documents to be stored, distributed, and analyzed for decision 
making.</span>
olchik [2.2K]3 years ago
4 0

Answer: (D) It allows documents to be stored, distributed, and analyzed for decision  making.

Explanation:

 The document creation is one of the key business function as it allow the document to store, analyzed and also distributed for the decision making. The document creation is one of the technical part of the communication.

There are many different types of document and each document exhibits its different use of purpose like providing and also collecting different types of information or data.

Therefore, Option (D) is correct.  

You might be interested in
Why should a person consider doing an apprenticeship?
dedylja [7]
There are many good things that can come out of it. There is good job training opportunities as well as learning the ways of the place. you can learn how people in that area work as well as their pace,emotions toward each-other and even lifestyles. there are many good outcomes to doing it.
5 0
3 years ago
Given an array of n distinct integers,d = [d[0], d[1],.., d[n - 1]], and an integer threshold, t, how many (a,b,c) index triplet
Setler79 [48]
I have a lot to say do not have to do this for the mnoth was the first day I was able to open and sign the new JTI documents and sign electronically sign up for additional support and electronically sign up for additional support and electronically sign documents electronically electronically sign the signature documents electronically sign up
4 0
3 years ago
EASY QUESTIONS! 10 POINTS AND BRAINLIEST FOR BEST ANSWER! PLEASE HELP ANSWER THIS only if you know BOTH ANSWERS!
Illusion [34]

Answer:

chain also why would some knock on their own dang door lol

Explanation:

it's easy indeed

8 0
4 years ago
Read 2 more answers
What do you enter at the command prompt to prevent the shell from using to much of the systems resources?
kap26 [50]

Answer:

Ulimit is the correct answer for the above question.

Explanation:

The Linux operating system is a system on which a user can work on multiple programming system. If a user is working on multiple programs then he needs to set the limit for the system resources so that the system can not access so many resources for any particular program and he can able to access multiple programs. For this a user needs to use the Ulimit command which syntax is as follows--

ulimit [-A] (Where A can be any of them (a, b, c, d, e, f, H, i, l, m, n, p, q, r, s, S, t, T, u, v, x) which refers the type of and units of resources.)

The question asked about the command which is used to prevent to use many of the system resources, then the answer is Ulimit command which is described above.

3 0
3 years ago
What is the overall objective of an IT risk assessment? To assist IT management in establishing a budget for countermeasures To
QveST [7]
The overall objective of an IT risk assessment is to assist an organization in identifying risks and impacts.<span> The process includes discovering, correcting and preventing security problems.</span>
The IT risk assessment document identifies threats, estimates risks and determines how to manage them.
4 0
3 years ago
Other questions:
  • A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. zombie
    15·1 answer
  • Desirable workplace habits and skills include:
    6·2 answers
  • Truck drivers probably cannot see your vehicle if you cannot
    6·2 answers
  • A pair is a simple struct with two data members, one of type T1 and one of type T2. A set and a map are organized as binary sear
    10·1 answer
  • 4.3 Code Practice<br> edhisve
    13·1 answer
  • Why transport layer is usingconnectionless services if network layer is providing connection oriented services?
    10·1 answer
  • A tiny spot on an LCD monitor display screen that permanently remains black when it should be activated and displaying color is
    12·1 answer
  • The process of auditing the source code for an application to verify that the proper security controls are present, that they wo
    14·1 answer
  • Because of increasing advances in technology, there are careers available that weren’t even invented 10 years ago. One such care
    13·1 answer
  • Please help i will give you brainlest!!!!!!!!!
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!