1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
topjm [15]
3 years ago
11

A strategic information system can be any kind of information system that uses information technology to help an organization __

________. Select one: a. gain a competitive advantage b. reduce a competitive disadvantage c. meet strategic enterprise objectives d. All of the choices are correct.
Computers and Technology
1 answer:
ruslelena [56]3 years ago
3 0

Answer:

The correct option is d.) All of the choices are correct.

Explanation:

The SIS (Strategic Information System), it is developed for respond the corporate world which is used for giving higher advantages of the competition. It was introduced by Dr. Charles Wiseman in 1982 and it is primarily used in the field of the information systems, the strategic information systems is created in the response to the business initiatives to provide the competitive advantage.

You might be interested in
Allison needs to graph the yearly average snowfall in Alaska. She should use a:
bazaltina [42]

C: bar graph

bar graphs are used to track changes over time, so I would say that C is your best bet

7 0
3 years ago
Read 2 more answers
Me Completan Pliiiis
Brut [27]
Can you translate please i’ll help better
4 0
3 years ago
What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
NNADVOKAT [17]

The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.

Explanation:

  • Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
  • To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
  • A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
3 0
3 years ago
When a customer places an order atBookBox.com, the company processesthe customer's payment information,sends the order to the ne
mash [69]

Answer:

fulfillment management process

Explanation:

According to my research on the different business process', I can say that based on the information provided within the question this is best described as the fulfillment management process. Which is the process that a company goes through from accepting an order to delivering that order to the client. Which is what is happening in this situation.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
4 years ago
External network security threats can include management failure to support organization-wide security awareness, inadequate sec
stiks02 [169]

Answer:

B. False

Explanation:

External security threat can be defined as any threats coming outside the company's computer network operation, usually carried out with negative or hostile intent for the purpose of stealing information or distracting the flow of operation. For example, Virus Attack

However, given that the question talked about the "management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures."

Hence, this is not an External Security Threat, which means, the correct answer is FALSE.

5 0
4 years ago
Other questions:
  • Image files are grouped into two categories: _____.
    5·1 answer
  • What is the primary reason that organizations change their structure through downsizing, outsourcing, and offshoring as a means
    14·1 answer
  • You would like to conduct a survey and ask your web page visitors to indicate the computer operating systems that they use. Each
    5·1 answer
  • What are the names of the 3 main languages used for making websites
    10·1 answer
  • If your TV was showing a flat black or blue screen, or had "snow", what steps would you take to fix it?
    13·1 answer
  • In a singing competition, there are 34 more men than women
    5·2 answers
  • Anyone has any ideas for a gaming setup i can buy for christmas. Something with high framing rates (monitor included) for about
    15·1 answer
  • Which statement best defines the Control Pannel?
    12·1 answer
  • Explain why computer professionals are engaged in technical services
    14·1 answer
  • Algorithm to eat orange<br><br>​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!