1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
3 years ago
5

Tweaking existing technology in a new way is usually called _____. leveraged creativity state-of-the-art breakthrough applicatio

ns engineering product adaptation
Computers and Technology
1 answer:
just olya [345]3 years ago
8 0

Answer: Leveraged creativity

Explanation:

Improving functionality and performance of any technology through new and unique methods so that it can lift above the competing organization and technologies. Experts and guides try innovating the technology through various attempts which is caused by maximizing advantage through creativity.

  • Other options are incorrect because application engineering, adaptation of product and state of art breakthrough does not influence the technology  to rise above the competing companies.
  • Thus, the correct option is leveraged creativity
You might be interested in
What was the first computer name brand
lilavasa [31]

Answer: <u>Electronic Controls Company</u> and was founded in 1949 by J. Presper Eckert and John Mauchly.

hope this helps!

4 0
2 years ago
Read 2 more answers
Correct single error in this. Try to appear relaxed, but not to relaxed​
hoa [83]

Try to appear relaxed, but not to relaxed .

7 0
3 years ago
You are designing a web application that stores static assets in an amazon simple storage service (s3) bucket. you expect this b
levacccp [35]
The answer is adding a random prefix to the key names. One way to introduce randomness to key names is to add hash string as prefix to the key name. for example, you can compute an MD5 hash of the character sequence that you plan to assign as the key name. from the hash, pick a specific number of characters and add then as the prefix to the key name. The casualness of the prefix more consistently distributes key names through multiple index partitions.
3 0
3 years ago
Which protocol is responsible for transporting files between a client and a server?
Anastasy [175]
Abcdefghijklmnopqrstuvwxyz
3 0
2 years ago
Read 2 more answers
___________ is an approach to boundary spanning that results from using sophisticated software to search through large amounts o
snow_tiger [21]

Answer: Business intelligence

Explanation:

Most of the enterprises and organizations collects huge amount of data through the use of MIS. These data can be based on any aspect of the business. But the collection of such large sets of data is useless until and unless there is a business intelligence associated with it. the work of business intelligence is to use software tools for analysis of the collected data so that it could be useful for enterprise or company to look for patterns and trends in the market.

The outcome of such business intelligence is very helpful particularly to managers, executives for taking particular decisions in the greater interest of the company.

So we can say, business intelligence is an approach to boundary spanning that results from using sophisticated software to search through large amounts of internal and external data to spot patterns, trends, and relationships that might be significant.

4 0
3 years ago
Other questions:
  • Which syntax error in programming is unlikely to be highlighted by a compiler or an interpreter? a variable name misspelling a m
    6·2 answers
  • _____is empty space between the margin and text.
    8·1 answer
  • The rules that determine what is allowed in a program are known as the
    14·1 answer
  • Samantha was calculating a mathematical formula on an electronic spreadsheet. She used multiple values to recalculate the formul
    7·2 answers
  • • Two advertisers A and B
    8·1 answer
  • Where should the Analytics tracking code be placed in the HTML of a webpage for data collection?
    10·1 answer
  • Three IT Companies. Help me please!
    5·2 answers
  • How to write (c program) code for 30/4 = 7.5. It should print 7.5, not 7
    12·1 answer
  • Moore’s law states that the number of transistors on integrated circuits doubles approximately every two years?
    15·2 answers
  • ______________ memory is a small, high-speed, high-cost memory that servers as a buffer for frequently accessed data
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!