1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
4 years ago
10

Which of them does not support decision making? Options DSS, GDSS, ESS All of above

Computers and Technology
1 answer:
Gala2k [10]4 years ago
8 0
Go to this website all of your anwers are here- http://www.academia.edu/9209970/ASSIGNMENT_C_Total_40_Question
You might be interested in
To set up a slide show you should do all of the following except ______.
Harlamova29_29 [7]
To set up a slide show you should do all of the following except exit without saving
5 0
4 years ago
What lets you change the order of events in a game?
IRISSAK [1]
B the story board editor.
8 0
3 years ago
You are considering using Wi-Fi triangulation to track the location of wireless devices within your organization. However, you h
earnstyle [38]

Answer:

Getting correct angle readings from each location.

Explanation:

Triangulation uses the angle of strongest signal from 3 locations to find their intersect points, but this means that if one of out 3+ readings is inaccurate, you would go on a wild goose chase.

3 0
3 years ago
g A user receives an email from an unknown source with a link to a website asking for their password. The userenters in their pa
SCORPION-xisa [38]

Based on the information provided, this user is a victim of phishing.

<h3>What is phishing?</h3>

Phishing can be defined as a type of cyberattack which involves making an attempt to obtain sensitive user information such as a password, especially by disguising as a trustworthy entity in an electronic communication (email), which is usually over the Internet.

In this context, we can infer and logically deduce that this user is a victim of phishing because he or she received an email from an unknown source with a link to a website asking for their password.

Read more on phishing here: brainly.com/question/23850673

#SPJ1

5 0
2 years ago
How to solve household arithmetic​
cluponka [151]

Answer:

just follow it's own formula

3 0
3 years ago
Other questions:
  • What does this road sign mean?
    11·2 answers
  • Monetary Policy can be either Expansionary or Contractionary. Which of the following actions classify as Expansionary Monetary P
    7·2 answers
  • Which data type or collection of data types can SOQL statements populate or evaluate to?
    9·1 answer
  • __________ is a single set of hardware, databases, networks, people, and procedures configured to collect, manipulate, store, an
    8·1 answer
  • How do you put a voice password on your computer using windows 10
    14·1 answer
  • Write convert() method to cast double to int
    7·1 answer
  • give the difference between functional and functional tools in the middle of to the circle give importance​
    10·1 answer
  • Explain how mobile phone production could be more sustainable​
    8·2 answers
  • True or false?
    6·1 answer
  • My sister told me an extremely funny joke. what is the direct object for this sentence ?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!