1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paul [167]
3 years ago
8

The first step in the information systems planning process is to ___________.

Computers and Technology
1 answer:
Basile [38]3 years ago
7 0

Answer: Analyze the organization's strategic plan

Explanation:

 The initial step in the information system is to first analyze the strategic plan of the organization so that we can easily identify the main objective and challenge.

It is basically archived by enlisting the particular objective and function in the planning of information system in the organization.

All the remining option are involve in the remaining step of the information system planning not in the initial step.

Therefore, analyze the organization's strategic plan is correct as it is the first step of the information system planning.  

You might be interested in
How do you get a crown on this website<br> look under your points on the right side of your picture
belka [17]
People will select your answer to be the BRAINLIEST. There has to be at least two answers on a question though. You cannot give yourself the brainliest answer either.
7 0
3 years ago
Read 2 more answers
How to use access?<br> like working in access and bringing tables and stuff
zheka24 [161]

I would recommend first familiarizing yourself with the program Access by watching introductions.

If you have even more time to spare and want hands-on experience, use Wise Owl exercises. Search up college classes assignments or guides. (Boy, do they love their big workbooks.) Essentially, do practice exercises.

5 0
3 years ago
An intranet is a way for a company or organization to protect copyrighted and other important information?
Korolek [52]

If this is true or false, it would be true

Hope this helps

-AaronWiseIsBae

4 0
3 years ago
Read 2 more answers
You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts acces
yulyashka [42]

<u>Client-server</u> implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts access those resources but do not host services of their own.

<u>Explanation:</u>

The client-server can be utilized on the web just as on a neighborhood (LAN). Instances of customer server frameworks on the web incorporate internet browsers and web servers, FTP customers and servers, and the DNS. Different hosts get to those assets yet don't have administrations of their own. Since it permits arrange permits numerous PCs/gadgets to interface with each other and offer assets.

5 0
3 years ago
5. Why are female fans particularly valuable to the sports industry? Cite two<br> specific reasons.
shusha [124]

Answer:Females make up a large part of the market. The female fans often times spend more on things and have a greater amount of it, so if they are able to target them, they have a gained a large amount of the market

Explanation:

hope it helps

7 0
3 years ago
Other questions:
  • What is computer virus?
    8·1 answer
  • If i throw papers in the dryer to help them dry faster could that mess up the dryer?
    5·1 answer
  • What is the windows server 2012 r2 feature that enables you to maintain previous versions of files on a server, so that if users
    10·1 answer
  • When developing e-business systems, an in-house solution usually requires a ____ for a company that must adapt quickly in a dyna
    11·1 answer
  • You are utilizing BitLocker Drive Encryption, and are attempting to update Windows Server 2016. What must be done so that the up
    14·1 answer
  • Adam's interview with the hiring manager is going well. However, he wants to ensure that his skills and work history are memorab
    6·1 answer
  • What is also known as computer Network?
    6·2 answers
  • 1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.
    12·1 answer
  • TOT al<br>Name TWO examples of these settings and utilities. (2)​
    12·1 answer
  • 15. Virus cannot infect files that are saved in i. USB ii. CD-ROMs iii. Memory card iv. All of them​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!