1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
topjm [15]
3 years ago
11

A strategic information system can be any kind of information system that uses information technology to help an organization __

________. Select one: a. gain a competitive advantage b. reduce a competitive disadvantage c. meet strategic enterprise objectives d. All of the choices are correct.
Computers and Technology
1 answer:
ruslelena [56]3 years ago
3 0

Answer:

The correct option is d.) All of the choices are correct.

Explanation:

The SIS (Strategic Information System), it is developed for respond the corporate world which is used for giving higher advantages of the competition. It was introduced by Dr. Charles Wiseman in 1982 and it is primarily used in the field of the information systems, the strategic information systems is created in the response to the business initiatives to provide the competitive advantage.

You might be interested in
Which service enables administrators to execute a command on remote computers using windows powershell or the windows remote she
Anvisha [2.4K]
Remote Assistance is the answer.
4 0
3 years ago
A business that subscribes to a specific computing model has its entire system fully functional within a short time. What benefi
defon

Its quick development

Quick deployment: When a business opts for cloud computing and subscribes to a specific model, its entire system can be fully functional within a short time—even within a few minutes. The amount of time depends on the kind of technology and the business’s computing needs.


7 0
3 years ago
If an ips identifies an attack, it can ________.
Gennadij [26K]

Answer:

a. drop the attack packet(s)

Explanation:

An IPS not only detects and alerts system administrators but it also stops attacks. It is built to consistently monitor a network, report malicious incidents and take preventative actions. So, how does an IPS work exactly? An IPS does a deep packet inspection and either blocks the IP of whoever sent the malicious packet or removes the malicious packet's content and repackages its payloads. Thus, this means that the malicious packet is completely dropped by stripping off of its header information and any infected items in the packet.

5 0
3 years ago
Describe how to add slide numbers and image to a Microsoft power point presentations ?​
Dafna11 [192]
Oh we did this in class I know this
6 0
3 years ago
What is programming blocks?
charle [14.2K]

Answer:

In computer programming, a block or code block is a lexical structure of source code which is grouped togethe

Explanation:

3 0
3 years ago
Other questions:
  • A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. zombie
    15·1 answer
  • "Two technicians are discussing FWD driveshaft service. Technician A says that removal of the driveshaft usually requires partia
    15·1 answer
  • Which type of storage disk and disk drive can be used in the given situation? Amy wants to borrow an interesting movie from Bruc
    10·2 answers
  • Best free vpn to bypass geo tagging
    5·1 answer
  • Why do we need IP Addresses in order for the Internet to function properly?
    7·1 answer
  • Tipos de lenguajes relacionados con c++?
    7·1 answer
  • 6.7 — Trickier Trap 4
    7·2 answers
  • Please use the tables in the flights database. Your deliverable should include a single SQL query that I can run against a "fres
    5·1 answer
  • Identify the correct answer in each item. Write your answer on the blank provided before
    13·1 answer
  • Providing captions and transcripts for videos on your website is a way of ensuring what?.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!