1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aneli [31]
3 years ago
15

What do Business Analysis workers do? Check all that apply.

Computers and Technology
2 answers:
soldi70 [24.7K]3 years ago
7 0

Answer: Recommend solutions to problems & Analyze information and problems.

A business analyst is a person that takes a look at a company's current system and tries to understand how the company works. These analyst seek to find out how the company will be in the future. Their main job is actually to oversee the different projects done by the company and analyze the different projects to determine if it would benefit the company or not.

Since business analysts thrive to understand their company's system, they are often the people who find information and problems that the company may have in the present or in the near future. These workers also recommend solution to problems that the company may have. The analysts are also often working with the IT departments of companies to help with the moving forward of the company's current system.

Whitepunk [10]3 years ago
6 0

Answer:

<em>Recommend solutions to problems & Analyze information and problems.</em>

Explanation:

You might be interested in
Does anyone play call of duty cold war campaign. I have a question, please help me.
-Dominant- [34]

Answer:

so please

Explanation:

please upload the question so I can answer ,by the way I don't play call of duty

5 0
3 years ago
Read 2 more answers
Which design principle will help me add an element of interest in my poster by avoiding confusion and monotony?
Rasek [7]

Answer:

You could add pictures to help convey the viewer, while capturing their attention. It will provide great interest as well.

Explanation:

Me being a viewer, I love to see pictures. They help explain the topic, while keeping my attention.

7 0
3 years ago
Create a single line comment before you define your variables that says ""Variable Definitions"".
tankabanditka [31]

Answer:

// Variable Definitions

int a=67;

float b=78.8797;

Explanation:

For creating a single line comment we use // slash. It is used for making the comment in the program. In this we made a comment with help of  // after that we create a two variable i.e a and b of integer and float type.

5 0
3 years ago
By dividing the control plane from the data plane, SDN offers the flexibility to view the entire data plane infrastructure as a
Mariulka [41]

Answer:

Virtual

By dividing the control plane from the data plane, SDN offers the flexibility to view the entire data plane infrastructure as a Virtual resource that can be configured and controlled by an upper layer control plane.

Explanation:

The separating data plane (SDN) is used by users to hide the specifics of a device data layer so that all devices would be treated equally thereby representing the entire data plane as a  virtual abstract layer thus enhancing network efficiency.

The SDN work mainly on the Control and data plane separating both of the planes. Also, the SDN make networks more agile and flexible.

SDN provides the flexibility to view the entire data plane infrastructure as a

virtual resource that can be configured and controlled by an upper layer

control plane.

6 0
3 years ago
Read 2 more answers
In ________, an attacker accesses the network, intercepts data from it, and even uses network services and/or sends attack instr
xxMikexx [17]
The answer is:  "drive-by hacking" .
____________________________________________
 
      "In<span> <u> drive-by hacking </u></span>, <span>an attacker accesses the network, intercepts data from it, and even uses network services and/or sends attack instructions to it without having to enter the home, office, or organization that owns the network."
_______________________________________________________________</span>
5 0
3 years ago
Other questions:
  • Wardrobe engineering is important because
    11·1 answer
  • The vast amount of data collected from Internet searches, social media posts, customer transactions, military
    8·1 answer
  • To execute a prepared SQL statement, you can use the ________________ and execute() methods of the PDOStatement object to set pa
    10·1 answer
  • Assume that name has been declared suitably for storing names (like "Misha", "Emily" and "Sofia"). Assume also that stdin is a v
    9·1 answer
  • The best way to achieve stronger encryption is to
    13·1 answer
  • World Book is a/an A. Social media platform. B. Textbook. C. Almanac. D. Encyclopedia.
    7·2 answers
  • Write the code for invoking a method named sendsignal. there are no arguments for this method . assume that sendsignal is define
    12·1 answer
  • Which of the following is true of binary files?
    6·2 answers
  • 5. Give one word answers:
    6·1 answer
  • In the following shell scripting extract, the initial values of variables s, c and p are 0, 1, 1 respectively. What will be the
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!