1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liubo4ka [24]
3 years ago
10

Renee's creating a plan for her business's information system. What should she do after she determines the goals for her busines

s?
A. Evaluate her plan for applying information systems to her business
B. Identify which areas of her business need information systems
C. Create an integrated plan for applying information systems to her business
D. Determine how applying information systems will increase her business opportunities
Computers and Technology
1 answer:
Sever21 [200]3 years ago
5 0
The correct answer is letter D, determine how applying information systems will increase her business opportunities. 

This is the smartest and the best step that she can take in order for her to increase her profits from her business. When here profits have increased, it is already easy to figure out the next steps on how she can expand her company. 
You might be interested in
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
Harman [31]

Answer:

The correct answer to the following question is Drive-by hacking .

Explanation:

Drive-by hacking is the type of hacking which comes under the cyberterrorism.

Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.

Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.

7 0
3 years ago
IblMessage.txt=welcome to fiji.what is the error in the coding and what type of error is it?(explain)​
spin [16.1K]

Answer:

The correct syntax (assuming WinForms) is

lblMessage.Text = "Welcome to fiji";

The given statement fails to follow the syntax of literal strings, which should be in quotation marks. (depending on the framework and programming language, the txt property may also be incorrect, as well as the missing semi-colon).

8 0
3 years ago
Often, the symptoms of withdrawal are __________.
guapka [62]
I would say none of the above as A, B, and C do not seem like sensible answers.
3 0
3 years ago
Write a function named “createPurchaseOrder” that accepts the quantity (integer), the cost per item(double), and the description
Leona [35]
#include
Program: using namespace std;
string createPurchaseOrder0;
int main(
{
cout<return 0;
}
string createPurchaseOrder(
{
int qty;
double costPerltem;
string description,info="":
cout<<"Enter Quantity:
cin>>qty;
cout<<"Enter cost per item: "
cin>>costPerltem;
cout<<"Enter Description: "
cin>>description;
if(qty<0 I| costPerltem<0
Idescription.compare(''"')==0)
cout<<'InThe entered data is invalid!":
info="":
else
"
cout<<"'InThe entered data is valid!":
info=info+"'(nQuantity: "+to_string (qty) +" In";
info=info+"Cost per item:
"†to_string (costPerltem)+"In";
info=info+"Description: "description+" In";
return info;

Output:
4 0
3 years ago
What activities are the most likely to infect your computer with a virus? Check all that apply
Alex17521 [72]
Opening unfamiler emails and visiting unknown websites
4 0
3 years ago
Read 2 more answers
Other questions:
  • The weird suspicious box that k12 sends the parents to put on the router. im getting strange privacy error messages on google an
    8·1 answer
  • The protocol that enables computers on the Internet to communicate with one another is called _____.
    10·2 answers
  • Changing the configuration of a database falls under which category of databaseâ administration?
    15·1 answer
  • Which Supreme Court case resulted in a decree issued for the Michigan Department of Corrections to provide female inmates access
    10·1 answer
  • Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's order takers often had difficulty de
    9·1 answer
  • A blue NFiPA label indicates: A) Health Hazard B) Special information C) Flammability D) Reactivity
    6·2 answers
  • What is processing requirement in computer?
    11·1 answer
  • The term technology is derived from the Chinese word. it is true or false​
    9·2 answers
  • 90 POINTS Hazel is working with a database to help determine if the company she works for is making or losing money. Hazel has o
    14·2 answers
  • PLEASE HELP WILL MARK BRAINLIEST
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!