1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
3 years ago
13

Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational sta

tistics and trends. This usage model is known as ________.
A) exception reporting
B) pull reporting
C) ad hoc reporting
D) drill-down reporting
E) push reporting - E) push reporting
Computers and Technology
1 answer:
Alona [7]3 years ago
6 0

Answer: E) Push reporting

Explanation:

Push reporting is defined as the reporting process in which information is believed to be shared by the reporter among the audience or viewers. Audience does not have any particular knowledge about that subject and basically unaware.Reporter researches about the topic significantly before sharing information.

Other options are incorrect because pull reporting is the reporting in which audience approach to gain knowledge on topic .Adhoc reporting is type of business intelligence mechanism. Exception reporting is reporting of actual task which moved away from expectation. Drill down reporting is exploration of data in layers.

Thus, the correct option is option(E).

You might be interested in
List out the process of Assembly in the film editing process. NO LINKS. answer ASAP
kobusy [5.1K]

Answer:

just try your best

Explanation:

7 1
2 years ago
Read 3 more answers
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
2 years ago
After establishing a long-term goal and understanding what it entails the best next step is to A plan numerous immediate short-t
qaws [65]

Answer:

A

Explanation:

After you make a big goal you must make many small goals to reach it

8 0
3 years ago
Read 2 more answers
How did Avery and Garth most likely create their
hram777 [196]
Avery used smartart and added shake
6 0
3 years ago
What is the name of the first program created using Scratch?
disa [49]

Answer:

Weekend

Explanation:

Scratch is a type of programming language that is block-based and has children as its target audience. With this, users can make online projects using the program interface.

The name of the first program created using Scratch was created and named Weekend.

6 0
3 years ago
Other questions:
  • Suppose your friend, who is a small business owner, wants to computerize her business functions such as accounting, payroll, and
    7·1 answer
  • A computer processor stores numbers using a base of: _____.a) 2b) 10c) 8d) 16
    13·1 answer
  • How does a layered pattern make use of abstraction and encapsulation?
    10·1 answer
  • Traditional methods of business communication tend to mean paper-based messages such as formal letters, brochures, reports, prop
    10·1 answer
  • Should organizations fear websites where consumers post negative messages about products or services? What actions can companies
    12·1 answer
  • How do you know if something is in the public domain
    5·1 answer
  • Computer privacy typically occurs when which of the following is violated?
    6·1 answer
  • Need help asap<br> give the correct answer!!
    15·2 answers
  • Cine stie repede va rog mult si repede
    9·1 answer
  • Task 2: Typing a School Speech
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!