1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
densk [106]
4 years ago
11

What are the three main sub-sectors in the IT-BPM industry?IT class 9​

Computers and Technology
1 answer:
sergeinik [125]4 years ago
8 0

Answer:

Business Process Managment.

Software Products.

Engineering Research and Development

You might be interested in
The term platform as a service has generally meant a package of security services offered by a service provider that offloads mu
Stells [14]

Answer:false

Explanation:

8 0
3 years ago
The force of impact is____.
sattari [20]
A.the speed which can comer a curve
8 0
3 years ago
Read 2 more answers
___ data is ____data; non-numeric data; observations are organized into categories without any recognition of order.
Virty [35]

Nominal data is qualitative data; non-numeric data; observations are organized into categories without any recognition of order.

<h3>What is qualitative data?</h3>

Qualitative data is information that cannot be counted, measured or easily expressed using numbers.

It is collected from text, audio and images and shared through data visualization tools, such as word clouds, concept maps, graph databases, timelines and infographics.

Qualitative data is the descriptive and conceptual findings collected through questionnaires, interviews, or observation.

Analyzing qualitative data allows us to explore ideas and further explain quantitative results.

For example, it could be notes taken during a focus group on the quality of the food at Cafe Mac, or responses from an open-ended questionnaire.

To learn more about qualitative data, refer

brainly.com/question/3151198

https://brainly.ph/question/5565846

#SPJ4

5 0
2 years ago
Which of the following functions needed to implement the information security program evaluates patches used to close software v
solong [7]

Answer:

a. Systems testing

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the term being defined is called System Testing. Like mentioned in the question, this is a technique used in order to evaluate the complete system the system's compliance against specified requirements, which tests its functionalities from an end-to-end perspective in order to evaluates patches used to close software vulnerabilities and make sure it complies with all policies.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
What are the five steps of ethical hacking?
Paraphin [41]

Answer

Explanation:

Hacking is simply gaining access into a computer through weaknesses that were found in the network system.

We have mainly 5 stages In ethical hacking which although must not be followed sequentially but could produce greater results if it was followed.

These stages includes

1. Reconnaissance

2. Scanning

3. Gaining access

4. Maintaining access

5. Covering tracks.

8 0
4 years ago
Other questions:
  • Two electronics students are discussing electrical units. Student A says that electrical power is measured in units called coulo
    5·1 answer
  • Which javascript method should you use if you want to specify a message string to appear on your web page as it loads?
    13·1 answer
  • A folder window shows you he contents of the folder
    8·1 answer
  • Which asset would be helpful in assessing a web or UI designer’s skills?
    13·2 answers
  • How do you know what memory to purchase for your computer?
    10·1 answer
  • A project team was researching the risks involved in setting up a computer system. They decide to go ahead with their plan, rega
    7·1 answer
  • The Joint Photographic Experts Group developed the ___________ graphic format.
    12·2 answers
  • Write code to create a list of numbers from 0 to 67 and assign that list to the variable nums. Do not hard code the list. Save &
    5·1 answer
  • Which XXX will prompt the user to enter a value greater than 10, until a value that is greater than 10 is actually input?
    14·1 answer
  • To configure a router/modem, what type of IP interface configuration should you apply to the computer you are using to access th
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!