1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8_murik_8 [283]
3 years ago
8

Identify an advantage of centralized processing

Computers and Technology
1 answer:
lara [203]3 years ago
7 0

Answer:

In a centralized organization structure, the centralized authority may have a better perspective on the big picture of the organization and how the subunits of the organization fit together and this may make centralized authority optimal.

Please mark brainliest, hope this helped :)

You might be interested in
Which is missing in most areas that do not have Karst topography?
ikadub [295]
A) Limestone is the correct answer

5 0
4 years ago
Read 2 more answers
Dillon logs online and receives this invitation to his best friend's birthday party:
Dominik [7]
Im goin to say that the red flags are gonna be instead of saying sams house add the address and for details they need to know if they need to bring anything for a just in case type deal. What games will be played? what time does it start? when does it end?<span />
7 0
3 years ago
What is a web designer's favorite snack
Nataly_w [17]
A web designers favorite snack is cookies.
5 0
3 years ago
Read 2 more answers
Title text boxes on every slide must be the same format.<br><br> A) True<br> B) False
masya89 [10]

Answer:

B) False

Explanation:

You can adjust the boxes to whatever you'd like, and even add more if you needed too.

4 0
4 years ago
Read 2 more answers
How does block chain support data privacy?
alexdok [17]

Answer:

Blockchain transactions allow users to control their data through private and public keys, allowing them to own it. Third-party intermediaries are not allowed to misuse and obtain data. If personal data are stored on the blockchain, owners of such data can control when and how a third party can access it.

Explanation:

hope it helps you

8 0
2 years ago
Other questions:
  • You install an M.2 SSD card in an M.2 slot on a motherboard. When you boot up your system, you discover the DVD drive no longer
    15·1 answer
  • In a program called Nature's Notebook, citizen volunteers make and report observations about seasonal changes in plants and anim
    15·1 answer
  • Describe the certifications developed by SANS. How are they different from InfoSec certifications like CISSP and SSCP?
    11·1 answer
  • In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
    6·1 answer
  • Text that is heavier or darker than other text in the document is considered _____.
    9·2 answers
  • FILL IN BLANK FOR THE POINTS!!!!!!
    8·1 answer
  • Computer Science uses the power of ______________ to solve problems.
    10·1 answer
  • Write a Python program that prompts the user for the cost of two items to be purchased. Then prompt the user for payment. If the
    11·1 answer
  • I used the app and my answers were still wrong??????how
    8·2 answers
  • HELLLLLLLLPPPPPPPPPPPP HHHHHHHHHEEEEEEEEELLLLLLPPPPPP MEEEEEEEE
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!