1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
3 years ago
15

Jane Estroisch works as a manager in a multidomestic firm. She focuses on the long-term questions facing the organization such a

s which countries to compete in and what organizational policies to follow. Jane is in the ________ level of the organization.A) operationalB) tacticalC) executiveD) functionalE) managerial
Computers and Technology
1 answer:
navik [9.2K]3 years ago
3 0

Answer:

b

Explanation:

Tactical. Perhaps she needs yo keep in touch with the board of directors in order to make an strategic planning.

You might be interested in
Steve adds a second 1-GB 240-pin DIMM to his PC, which should bring the total RAM in the system up to 2 GB. The PC has an Intel
egoroff_w [7]

Answer:

Option A is correct.

Explanation:

He attaches the second 1 Gigabyte 240 pins DIMM for his system the overall RAM will be up around 2 Gigabytes. System is fitted with Intel Core 2 Dual 3-GHz cpu as well as three 240 pins DIMM ports on the motherboard. Transforms on a system, just 1 Gigabytes of RAM is seen through that RAM count.

Thus, the following issue is much more probably to be the failure to correctly grab that RAM.

5 0
4 years ago
What is the difference between (IF instructions &amp; WHILE instructions )<br> 0<br> 를 들<br> T<br> !
lara31 [8.8K]

Answer:

While statements determine whether a statement is true or false. If what’s stated is true, then the program runs the statement and returns to the first step. If what’s stated is false, the program exits the while and goes to the next statement. An added step to while statements is turning them into continuous loops. If you don’t change the value so that the condition is never false, the while statement becomes an infinite loop.

If statements are the simplest form of conditional statements, statements that allow us to check conditions and change behavior/output accordingly. The part of the statement following the if is called the condition. If the condition is true, the instruction in the statement runs. If the condition is not true, it does not. The if statements are also compound statements. They have a header (if x) followed by an indented statement (an instruction to be followed is x is true). There is no limit to the number of these indented statements, but there must be at least one.

7 0
3 years ago
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
Pros and cons of the inter's<br> ability to access information
SpyIntel [72]
Pros and cons of the internet are the pros you can get the informaqtion needed to research and find out any information at your finger tips and get the answerws you need to certqin things fast. The cons the main one ise the people who misuse this to st4eal your information and indenity.
7 0
3 years ago
You've been asked to set up a temporary Internet cafe for a conference your company is hosting. You have ten laptops to use in y
kolbaska11 [484]

Answer: Cable Locks

Explanation:

  • The cable locks is one of the type of secure device that helps in physically secure the various types of laptops and computer system.
  • The cable lock helps the devices and the confidential information to prevent from theft and it is also known as the versatile security system.  
  • The cable lock is basically warp up in the form of metal cable and we usually insert the this cable lock into the laptop device slot in the system.  

  According to the given question, The cable lock is typically used in the laptop devices that protect and physically secure from the hacking purpose and it is used in the various types of deices such as printers, electronic devices and the laptops.  

7 0
3 years ago
Other questions:
  • Jake and Sarah have an assignment of writing the history of American independence as a team. They divided their work in hait and
    7·2 answers
  • How can touch typing quickly but accurately improve your earnings (the money you can make)
    15·2 answers
  • A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate exec
    9·1 answer
  • Once the data center routes to the destination server that hosts the website, whats the next step in the internet process?
    10·1 answer
  • How does a hard drive work?
    5·1 answer
  • Which function would you use to make sure all names are prepared for a mailing label?
    10·2 answers
  • The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
    7·1 answer
  • What is true about content based filtering
    8·1 answer
  • Help ASAP please This is a skills lab simulation for college, it’s on Microsoft word is there a keyboard shortcut or something o
    12·1 answer
  • 4. Cash inflows from investing activities normally arise from all of the following EXCEPT
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!