1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
7

__________ BI apps use real-time or near real-time data in order to support line managers who need to monitor performance of his

or her business processes.
a. Strategic
b. Operational
c. Tactical
d. Traditional
Computers and Technology
1 answer:
ruslelena [56]3 years ago
8 0

Answer: Operational BI(Business Intelligence)

Explanation:Operational business intelligence is the tool that works on the organizational performance through evaluation and testing by analyzing the business process and data.It is rapid responding tool for the changing business pattern and demands.

Strategical, tactical and traditional business intelligence tool don't provide the evaluation of the business performance in the accordance with business trends rather having strategical approach, planned approach and traditional approach respectively.

Thus, the correct option is option(b).

You might be interested in
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
Write a function, called valFrequency, that given a list of values as a parameter, counts the frequencies for each value in the
Marat540 [252]

Answer:

pray for me i fell sick

Explanation:

i ate a piece of carrot now im blind

7 0
2 years ago
Has replaced the need for landline telephones in many instance​
Vladimir79 [104]

Explanation:

million landlines. During this same time the number of mobile phone lines that have been subscribed to has ...

Characteristics

7 0
3 years ago
Consider the following sequence, defined from n=2 to 15 (inclusive). Pn=n2−1. Produce a list named primes which only contains va
omeli [17]

Answer:

primes = []

for n in range(2,16):

   pn = n*n - 1

   if is_prime(pn):

       primes.append(pn)

5 0
3 years ago
Without any formal planning, the president of a software company remarks in a speech that new technologically advanced software
Sphinxa [80]

Answer: The reducing project duration was caused by the emergence of new technology.

Explanation:

Emerging technologies are technologies whose development, practical applications, or both are still largely unrealized, such that they are figuratively emerging into prominence from a background of nonexistence or obscurity.

5 0
3 years ago
Other questions:
  • Guardrails are often used by employers to protect workers from falls. How high must the top guardrail be above the working surfa
    12·1 answer
  • if i set my payment and use free trial on Scribd website, can i cancel my payment and NOT PAYING after one month??
    8·1 answer
  • Written and artistic expressions are protected by
    8·1 answer
  • The Internet is considered a WAN. *<br><br> True<br> False
    9·1 answer
  • 14 Convert the<br>following binary<br>numbers to decimal <br>0011​
    10·2 answers
  • Waygate's residential Internet modem works well but is sensitive to power-line fluctuations. On average, this product hangs up a
    6·1 answer
  • Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động
    8·1 answer
  • Bro i swear whenever i play fortnite duos, they ask you if you don't have a mic, if you don't then they just leave, so annoying
    15·2 answers
  • Compare and contrast hardware and software.
    11·2 answers
  • a web server will utilize a directory protocol to enable users to authenticate with domain credentials. a certificate will be is
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!