1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
3 years ago
13

Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational sta

tistics and trends. This usage model is known as ________.
A) exception reporting
B) pull reporting
C) ad hoc reporting
D) drill-down reporting
E) push reporting - E) push reporting
Computers and Technology
1 answer:
Alona [7]3 years ago
6 0

Answer: E) Push reporting

Explanation:

Push reporting is defined as the reporting process in which information is believed to be shared by the reporter among the audience or viewers. Audience does not have any particular knowledge about that subject and basically unaware.Reporter researches about the topic significantly before sharing information.

Other options are incorrect because pull reporting is the reporting in which audience approach to gain knowledge on topic .Adhoc reporting is type of business intelligence mechanism. Exception reporting is reporting of actual task which moved away from expectation. Drill down reporting is exploration of data in layers.

Thus, the correct option is option(E).

You might be interested in
You are connected to a server on the Internet and you click a link on the server and receive a time-out message. What layer coul
Grace [21]

Answer: Application layer

Explanation: Application layer is the level in the OSI model which carries out the function of the abstraction in the network.The abstraction works by maintaining the interface between application and network.

It helps in the transferring of the information and data as well using the protocols. So,if any time out message alert is received  by clicking on the link then the server condition is usually busy and thus cannot respond. In this case application layer is responsible for the problem.

7 0
3 years ago
The Mifflin Cable store in Buffalo is currently offering a fabulous marketing strategy for potential new cable and Internet cust
worty [1.4K]

Answer:

Decrease buyer power

Explanation:

The company is trying to decrease the power that buyers have by ensuring that the market system is properly controlled. The company wants to regulate the economic conditions of the market and have the controlling power of the market system. Gifts and other benefits are offered by the company to the buyers to coarse them.

8 0
4 years ago
Which type of evidence should victims collect to help officials catch cyber bullies
iren [92.7K]

Answer:

How you get cyberbullied just look away from the screen -Tyler The Creator

Explanation:

3 0
4 years ago
Read 2 more answers
HELP ASAP
CaHeK987 [17]
The answer is B, e commerce. Have a good day
3 0
3 years ago
Write a C Program to Print the initial letter of Name Ferdous
Murrr4er [49]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The question is about writing a C program that prints the initial letter of Name Ferdous.

Therefore, below is the given complete code that prints the first letter of the name Ferdous.

<em>#include <stdio.h> </em><em>/*import strandard input/output library*/</em>

<em>#include<string.h></em><em> /*import string library to handle string type of data*/</em>

<em> </em>

<em>int main(void) </em><em> /*started the program execution- program entry point*/</em>

<em>{ </em>

<em>char *str = "Firdous";</em><em>   /*char to pointer str contains string "Firdous"*/</em>

<em>int len = strlen(str);  </em><em> /*this line of code is not neccary, but if you print other character for example last character of the name then you can use it*/</em>

<em>printf("First Letter of the name is: %c", str[0]); </em><em>  /*print first letter of the name*/</em>

<em>} </em><em>  /**program terminated*/</em>

5 0
3 years ago
Other questions:
  • Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets i
    9·1 answer
  • Briefly discuss constraints
    13·1 answer
  • External auditing is an independent appraisal function established within an organization to examine and evaluate its activities
    11·1 answer
  • What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web se
    13·1 answer
  • When adding shapes to a presentation, the outline can be one color, and the fill must be the exact same color.
    12·2 answers
  • What will happen if you delete system32?
    7·1 answer
  • What Does S.T.E.M stand for?​
    8·1 answer
  • Eating food while drinking speeds up alcohol<br> absorption.<br> True<br> False
    5·2 answers
  • Legends are titles given to three-axis X, Y, and Z-axis. True or false?
    6·1 answer
  • 3.12 LAB: Output range with increment of 5 Write a program whose input is two integers, and whose output is the first integer an
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!