1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marta [7]
3 years ago
10

The way in which we view ourselves is called

Computers and Technology
1 answer:
vlada-n [284]3 years ago
7 0
Reflected Appraisal I believe
You might be interested in
BI systems have eliminated a common organizational problem, which is simultaneously having too much data but somehow not enough.
lyudmila [28]

Answer:

True

Explanation:

Most of the organization suffers from InfoObesity, i.e., too much data without the proper holding structure for this.

Business intelligence abbreviated as BI plays a major role in the determining the planning strategies of an organizations and serves multiple purposes which includes measurement of performance towards business objectives, quantitative analysis, data reporting and sharing, etc.

BI systems helps in eliminating InfoObesity, by manging the data and filtration of the data with proper data structure to serve specific purposes.

8 0
3 years ago
Kahnacademy sucksi am so mad i want to k ..<br> ill myself
ehidna [41]
No don’t do thattt ….
4 0
3 years ago
Instructions:Select the correct answer.
balandron [24]
The answer is installing antivirus software
3 0
3 years ago
Mohammed’s parents learn that his classmates have begun sending him text messages making fun of his heritage. Mohammed says he’s
pychu [463]

Answer:

Mohammed doesn't believe the cyberbullying exists.

Explanation:

If he knew he wouldn't say they are teasing him. I mean, how would their parents know he is being cyberbullied without evidence? Text messages(such as imessages) are most likely on phones, and not on computers.(Unless its an mac I believe.) And they are bullying him; its not using technology positively.

7 0
3 years ago
Read 2 more answers
Where can I learn how you hack?​
morpeh [17]

Answer:

www.udemy.com

5 0
3 years ago
Read 2 more answers
Other questions:
  • from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing
    13·1 answer
  • Microsoft's
    8·1 answer
  • Within the seven domains of a typical IT infrastructure, there are particular roles responsible for data handling and data quali
    10·1 answer
  • Which elements are in the Sort dialog box? Check all that apply.
    9·1 answer
  • What is the benefit of the load balancing logic to end-user?
    15·1 answer
  • 1)When the liquid is spun rapidly, the denser particles are forced to the bottom and the lighter particles stay at the top. This
    10·1 answer
  • Having data in a column formatted differently based on value is known as
    7·1 answer
  • Adam has designed and tested an Android app for a startup. The client expects to get quick responses to the app. After consultin
    7·1 answer
  • For a direct-mapped cache design with a 64-bit address, the following bits of the address are used to access the cache
    7·1 answer
  • Pleasee helpppppppppppppppppppppp me!
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!