1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
3 years ago
15

Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans.Mary is al

so interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____.
Computers and Technology
1 answer:
kherson [118]3 years ago
7 0

Answer:Business analyst

Explanation: Business analyst is the person in an organization who analyzes the need and working of the business system.It has the functions of analyzing the business process followed in organization, documentation, domain of access etc.

Mary is advised for opting the business analyst post by the advisor because of the qualities she mentioned in the job she wants to pursue.

You might be interested in
On laptops with a smart card reader installed, where is the smart card reader usually located?
muminat

On laptops with a smart card reader installed, where is the smart card reader usually located Under the palm rest

<u>Explanation:</u>

A smart card reader is a design that can scan a card with some kind of barcoding or magnetic strip in it. Some Palmrest construction holds the smart card reader and ribbon cable junction board. Palm rest is frequently placed at the front of your laptop.

Smart card readers are commonly at both ends of the palm rest. It can simply be found on with USB and HDMI ports. Now Palm rest with fingerprint reader, smart card reader, and speaker removal are available.

<u />

<u />

4 0
3 years ago
Which finger types the return or enter key?
levacccp [35]
Usually the ring finger
8 0
3 years ago
Read 2 more answers
your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
Ivan

The protocol that should be used to establish a secure network connection for backups is SSH.

<h3>Secure Shell</h3>

SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.

SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:

  • Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
  • SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
  • Perform automatic and secure file transfers.
  • Launch commands securely on remote devices or systems.
  • Perform secure component management of network infrastructure.

Learn more about Secure network connection: brainly.com/question/28083478

#SPJ4

8 0
1 year ago
What is the difference<br> difference between<br> Open<br> and recent<br> command?
Nostrana [21]
The difference between the new and open commands on the file menu are quite simple. The new command creates a brand new file, while the open command opens a file that already exists or has been created.
3 0
3 years ago
Blackbaud is a company that supplies services and software designed for nonprofit organizations. Which type of e-commerce websit
natka813 [3]

Explanation:

Blackbaud's software products are specially designed to support the unique needs of nonprofit and social good organizations.

Explore our software solutions that can help you advance your organization's mission.

3 0
3 years ago
Other questions:
  • What is an apprenticeship
    7·1 answer
  • Computer Architecture
    7·1 answer
  • 1. What are the built-in operations on classes?
    8·1 answer
  • Solve the recurrence relation.<br> S(1)=1<br> S(n)= S(n-1)+(2n-1) for n&gt;=2
    13·1 answer
  • Mariah was working on a multimedia presentation that included both video and audio files. The file was huge, and she wanted to s
    13·2 answers
  • A network systems administrator would most likely help with
    13·2 answers
  • What is the by stander effect
    9·1 answer
  • hey guys just dropped some hot beats so go and follow me my user is the beats and comment if you would do that that would be gra
    11·1 answer
  • Kyle returns to work the next day and he would like to continue working on the document from yesterday. What should Kyle do?
    7·1 answer
  • What should a pie chart represent?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!