1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lubov Fominskaja [6]
3 years ago
10

Information that has been analyzed and refined so that it is useful to policymakers in making decisions; specifically, decisions

about potential threats to our national security is known as______________.
Computers and Technology
1 answer:
denis-greek [22]3 years ago
8 0

Answer:

Intelligence

Explanation:

Intelligence is the product resulting from the collection, collation, evaluation, analysis, integration, and interpretation of collected information. It is a specialised information product that provides an adversary with information required to further its national interests. One of the most important functions of intelligence is the reduction of the ambiguity inherent in the observation of external activities.rations.  

In most cases, the development of an intelligence product involves collecting information from a number of different sources. In some cases, information may be disseminated immediately upon collection based upon operational necessity and potential impact on current operations.

Strategic intelligence provides policy makers with the information needed to make national policy or decisions of long-lasting importance. Strategic intelligence collection often requires integrating information concerning politics, military affairs, economics, societal interactions, and technological developments. It typically evolves over a long period of time and results in the development of intelligence studies and estimates.

Operational intelligence is concerned with current or near-term events. It is used to determine the current and projected capability of a program or operation on an ongoing basis and does not result in long-term projections. Most intelligence activities support the development of operational intelligence.

You might be interested in
Create a mobile app plan using PowerPoint slides to show mock-ups of screens,
TiliK225 [7]

Answer: Have you gotten an answer yet?

6 0
3 years ago
What is the major difference between the intranet and extranet?
slega [8]

Explanation:

Iinternet is hudge graphicla network and intranet is small network as compare to internet

8 0
2 years ago
According to the municipal solid waste report what are the benefits of recycling
oksano4ka [1.4K]

Answer:

Reduces the amount of waste sent to landfills and incinerators

Conserves natural resources such as timber, water and minerals

Increases economic security by tapping a domestic source of materials

Prevents pollution by reducing the need to collect new raw materials

Saves energy

Supports American manufacturing and conserves valuable resources

Helps create jobs in the recycling and manufacturing industries in the United

6 0
3 years ago
What is performance? Multiple Choice measures how quickly a system performs a process or transaction a system that is not operat
Lilit [14]

Answer: measures how quickly a system performs a process or transaction

Explanation:

Computer performance refers to how well a given computer system performs, which is estimated by its accuracy, efficiency and speed when completing a process or transaction.

A computer performance evaluation will assess a system's resources and outputs to make sure that it´s performing in the best possible way.

Some parameters of performance are latency, speed, throughput, and bandwidth.

8 0
3 years ago
Read 2 more answers
What is a perfect hashing function?
antiseptic1488 [7]

Answer:

First we understand what is hash function.A hash function is mostly used in Hashmaps. It maps different keys to a set of values.There may occur a case when we have same key but different values.This case is called collision.So we have to use different collision handling techniques that are open addressing and separate chaining.

A perfect hash function maps key-value pair such that there are no collisions.

3 0
3 years ago
Other questions:
  • Which is an example of an input device?
    15·2 answers
  • Ryan is the operations manager for a national financial company. His company is in the process of creating a customer handbook.
    13·1 answer
  • Microprocessors can’t directly understand programming languages, so programs have to be converted into _____________ that corres
    15·1 answer
  • Your computer is configured to obtain an ipv4 address and dns server address automatically. what utility will help you to find t
    12·1 answer
  • Solve the recurrence relation.<br> S(1)=1<br> S(n)= S(n-1)+(2n-1) for n&gt;=2
    13·1 answer
  • Analytical CRM systems are the input for operational CRM systems.<br><br> True<br><br> False
    11·1 answer
  • The following relation schema can be used to register information on the repayments on micro loans.
    13·1 answer
  • What is the unit used to describe the intensity of sound?
    5·1 answer
  • Worksheet Identify the devices for moving the cursor around your computer screen
    12·1 answer
  • One way to check if a website is secure is to look for a/an<br> in the address bar.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!