1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iris [78.8K]
3 years ago
5

What is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same

time establishing appropriate controls to ensure minimum errors?
Computers and Technology
1 answer:
borishaifa [10]3 years ago
6 0

Answer:

The correct answer to the following question is COBIT(Control Objectives for Information and Related Technology).

Explanation:

COBIT is the framework which is developed by the Information Technology Management and Governance(ISACA).

COBIT is very helpful for those persons who have the first responsibility for their business processes and their business technologies, for those who depend on the technologies for reliable informations and it also provides the qualities, reliabilities, and control of the informations.

You might be interested in
11. Explain different types of program control with suitable flow chart.<br> N
melamori03 [73]

hi

Counting a sequence of statements without any decisions or branches as one control structure (as many computer scientists do),the if, if-else, and if-else-if ladders as one control structure,the three types of loops (while, do-while, and for) as three different control structures,the break and continue statements, in the context of loops, as one more (although this can be debatable),the switch/case control structure as one,the call/return mechanism as one,the ability to specify and call a callback function as one,the goto/label as one,and the setjmp/longjmp non-local goto as one,

5 0
2 years ago
Libby wrote an email to her friend. She pressed Shift and the number key 2 together to enter the email address. Which symbol did
exis [7]

When Libby wrote the email to her friend, she typed the '@' symbol. When pressing SHIFT and 2 together, it pastes this aforementioned symbol. However, there isn't any specific name for the symbol. As a matter as fact, there are several names that this symbol goes by.

The most famous name this symbol is called is the "at symbol" or the "at sign". In terms of a formal name, "commercial at" would be a good one.

Here's an example with the symbol:

[email protected]

This is essentially telling the email server where to send your email. From this, they'll know it's located at brainly.com! It's pretty neat.

4 0
3 years ago
Read 2 more answers
Describe how a computer checks whether the image just taken by the camera matches the scanned photograph.
eimsori [14]

Answer:

by it scan properly like you use Camara

when we use camara and it have record time like that it also have that type of scan data so that the computer use

sorry I don't no other thing and I an sorry for the very short answer

5 0
3 years ago
The capacity of a communication channel is measured in _______.
PSYCHO15rus [73]
<span>The capacity of a communication channel is measured in gb and gps.</span>
4 0
3 years ago
Read 2 more answers
A 5-inch, f/10 telescope has a 2-inch eyepiece focal. Its magnifying power is: (PLEASE HELP)
tatiyna
The answer is a lol i just looked it up                       







5 0
3 years ago
Other questions:
  • Which function of a web page relies on responsive web design? Adding extra horizontal scroll Blocking mobile devices from viewin
    11·2 answers
  • How is a computer component, such as a network card, commonly marked for identification?
    12·1 answer
  • How to make flashcards on microsoft word 2010?
    7·1 answer
  • You have compiled a new kernel using rpm. when you reboot, the new kernel is not the default selection on the boot menu. you use
    10·1 answer
  • Write a method reverse( ) for OurLinkedList class. The method should return a new OurLinkedList object that is the reverse of th
    8·1 answer
  • Which is the correct process for attaching a file?
    12·1 answer
  • Suppose 8 people want to communicate with each other using public key encryption. The communication between any pair of them is
    7·1 answer
  • If you face an investigation where dangerous substances might be around, you may need to obtain which of the following?
    13·2 answers
  • Suppose that a computer has three types of floating point operations: add, multiply, and divide. By performing optimizations to
    7·1 answer
  • Please what do you guys think about this ?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!