1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AleksAgata [21]
3 years ago
8

___________ is an approach to boundary spanning that results from using sophisticated software to search through large amounts o

f internal and external data to spot patterns, trends, and relationships that might be significant.
Computers and Technology
1 answer:
snow_tiger [21]3 years ago
4 0

Answer: Business intelligence

Explanation:

Most of the enterprises and organizations collects huge amount of data through the use of MIS. These data can be based on any aspect of the business. But the collection of such large sets of data is useless until and unless there is a business intelligence associated with it. the work of business intelligence is to use software tools for analysis of the collected data so that it could be useful for enterprise or company to look for patterns and trends in the market.

The outcome of such business intelligence is very helpful particularly to managers, executives for taking particular decisions in the greater interest of the company.

So we can say, business intelligence is an approach to boundary spanning that results from using sophisticated software to search through large amounts of internal and external data to spot patterns, trends, and relationships that might be significant.

You might be interested in
5.23 LAB: Contains the character
torisob [31]

Answer:

In C++:

#include<iostream>

#include<vector>

using namespace std;

int main() {

int len;

cout<<"Length: ";  cin>>len;

string inpt;

vector<string> vect;

for(int i =0;i<len;i++){

  cin>>inpt;

  vect.push_back(inpt); }

char ch;

cout<<"Input char: ";  cin>>ch;  

for(int i =0;i<len;i++){

  size_t found = vect.at(i).find(ch);  

      if (found != string::npos){

          cout<<vect.at(i)<<" ";

          i++;

      }

}  

return 0;

}

Explanation:

This declares the length of vector as integer

int len;

This prompts the user for length

cout<<"Length: ";  cin>>len;

This declares input as string

string inpt;

This declares string vector

vector<string> vect;

The following iteration gets input into the vector

for(int i =0;i<len;i++){

  cin>>inpt;

  vect.push_back(inpt); }

This declares ch as character

char ch;

This prompts the user for character

cout<<"Input char: ";  cin>>ch;  

The following iterates through the vector

for(int i =0;i<len;i++){

This checks if vector element contains the character

  size_t found = vect.at(i).find(ch);  

If found:

      if (found != string::npos){

Print out the vector element

          cout<<vect.at(i)<<" ";

And move to the next vector element

          i++;

      }

}  

7 0
2 years ago
Installing unauthorized hardware such as a communication software and modem Select one: a. Is a common practice and does not aff
Alisiya [41]

Answer:

b. May introduce the potential for a security breach using a backdoor programmed into software

Explanation:

muchos malware dedicados al robo de datos son encriptados dentro de codigos que simulan aplicaciones de mensajería, diseñadas para parecerse a programas originales, muchas personas, sin el entrenamiento necesario, no notarían la diferencia, y por desconocimiento instalarían software peligroso.

las empresas, para cuidar el estado de la red, las computadores y los datos que manejan, adquieren softwares de fuentes confiables y verificadas por lo que hacer uso unicamente de estas aplicaciones autorizadas es la manera de mantener segura la red informática de la empresa.

7 0
4 years ago
How to make a slideshow out of pictures in a folder windows not fitting to screen?
weqwewe [10]

Answer:

Windows slideshow.

Explanation:

Creating or displaying a collection of images in a windows file can be very ecstatic and it is quite possible using third party applications.

One way of creating a slideshow is using the screensaver desktop option. There are other easy ways like the wallpaper option and using powerpoint presentation.

To using the screensaver option, go to windows settings and click on personalize, here, use can select a theme or a group of image files, click on a color theme and click apply.

8 0
3 years ago
Select the correct answer.
Veronika [31]
I think it’s c. llS....
6 0
3 years ago
Read 2 more answers
When an entrepreneur has three employees at a busy and growing software company, what is the primary responsibility of the entre
polet [3.4K]

To direct the employees and respond to any calls/emails regarding a problem or upgrade that should be changed/fixed. (I don't know if that's what you wanted)

4 0
4 years ago
Read 2 more answers
Other questions:
  • How can you best utilize CSS for Web Development?
    6·1 answer
  • How are appointments scheduled in medisoft
    12·1 answer
  • What is a type of destructive program?
    8·2 answers
  • Use induction on n to prove that fir all n&gt;=2, 2^n+3^n&lt;5^n
    11·1 answer
  • Which of the following terms is computed as cash provided by operations less capital expenditures and cash dividends? A : adjust
    5·1 answer
  • Using ________ data mining, the user usually begins by telling the data mining software to look and test for specific patterns a
    15·1 answer
  • A radiologist’s computer monitor has higher resolution than most computer screens. Resolution refers to the:______
    15·1 answer
  • 1. As part of your community, your school, and your neighbourhood, how else does ICT have an impact on social
    11·1 answer
  • What does a good résumé help you do?
    10·1 answer
  • 1
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!