1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iris [78.8K]
3 years ago
5

What is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same

time establishing appropriate controls to ensure minimum errors?
Computers and Technology
1 answer:
borishaifa [10]3 years ago
6 0

Answer:

The correct answer to the following question is COBIT(Control Objectives for Information and Related Technology).

Explanation:

COBIT is the framework which is developed by the Information Technology Management and Governance(ISACA).

COBIT is very helpful for those persons who have the first responsibility for their business processes and their business technologies, for those who depend on the technologies for reliable informations and it also provides the qualities, reliabilities, and control of the informations.

You might be interested in
How do you take a screen shot on hp pavilion dm3
drek231 [11]
Press and hold down the "Fn" button while pressing the "Home Prt Sc" button above the numeric keypad to capture the entire screen. Make a screenshot of the active window only by holding down the "Fn" and Alt" keys while pressing "Home Prt Sc." 2. Press the "Start" button, and type "Paint" into the search box.
5 0
3 years ago
What is the proper citation for a video source? A. Video: Hank Aaron. Dir. Don Donto. VidCassette. 1985. DVD. Home Video, 1986.
VashaNatasha [74]
The answer it had to be B
6 0
3 years ago
As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taki
solong [7]

Answer:

Option(B) i.e., social engineering  is the correct option to the question.

Explanation:

The following option is correct because social engineering is the type of attack in which the criminals tricks the computer users to disclose the confidential data or information. Criminals or hackers use this trick because by this they can easily take advantage of your confidential information or corporate secrets.

4 0
3 years ago
What careers are most likely to require business skills
olchik [2.2K]

i would say maybe an accountant, entrepreneur, business reporter, or something like that.

8 0
3 years ago
Compare this country early use of credit to its use today?
Stolb23 [73]

Answer:

Explanation:

A credit is a financial transaction where someone takes a loan for a certain amount of money to another person, and this another must pay this money in a period of time, determinate from both parts, in this case, a country can get a credit, if this country pay this debt, the country will have a good record, and they can to ask another credit, but if they don't pay, the debt will be bigger.

7 0
3 years ago
Other questions:
  • Write a program which can do a String Check if its Panagram or not!
    10·1 answer
  • Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output param
    11·1 answer
  • A_____refers to the entire Excel file
    14·1 answer
  • Which of the following types of access controls do not describe a lock? (a)- Directive (b)- Physical (c)- Preventative (d)- Dete
    8·1 answer
  • Which model emphasizes the risk analysis phase of development
    12·1 answer
  • Which amendment to the Constitution ended slavery in the United States?
    8·1 answer
  • Statement Widgets or gadgets are _____ programs that appear on the desktop and display little pieces of information such as a ca
    5·1 answer
  • The elements of an integer-valued array can be set to 0 (i.e., the array can be cleared) recursively as follows: An array of siz
    14·1 answer
  • How to install an older version of prettier on yarn
    9·1 answer
  • Write a loop that reads positive integers from console input, printing out those values that are even, separating them with spac
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!