1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
9

Sarah's research shows that business information management professionals also perform the duties of other professionals. Which

other duties are performed by business information management professionals? Business information management professionals also perform duties of __________________ information systems professionals.
Computers and Technology
1 answer:
aev [14]3 years ago
3 0

Answer:

Business information management professionals also perform duties of <u>management</u> information systems professionals

Explanation:

A career in business information requires a diploma or degree in business information management or business administration as well as being required to carry out the tasks of a management information systems (MIS) professional of which the knowledge required on data communications and computers can be obtained by completion of a certification or degree in MIS or an associate degree in information technology. In addition, a strategic management certification can further improve a career in business information management.

You might be interested in
PLEASE HELP PROGRAMMING WILL GIVE BRAINLIEST
DaniilM [7]

Answer:

1. would be B.

2. would be D

3. May I ask if it can be multiple answers?

Explanation:

1. In coding a if statement has to follow if something is true or not. If we are talking about a if and then statement it will skip that block and move to the next block of the "then" part of the "if then" Statement if the first part is reported false

2. This is a easy one, so it has to be either a 3.25 GPA or higher or they have to have either 100 hours or more.

3. waiting for a comment back :)

4 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
What is the body of scientific knowledge based on?
ANTONII [103]
It depend on all such as guess ,observation ,hypothesis and etc
3 0
3 years ago
Read 2 more answers
This function chooses the screen to display based on the score.What is the correct way to call this function?
mario62 [17]

Answer:

checkWin();

Explanation:

its in the code

7 0
3 years ago
Read 2 more answers
A user can set the security and privacy settings on what is displayed in the message bar from the ________ within the options me
djverab [1.8K]
Depends on the Operating System
6 0
3 years ago
Other questions:
  • A directional antenna issues wireless signals along a(n) ____ direction.
    9·1 answer
  • A short-circuit evaluation is where each part of an expression is evaluated only as far as necessary to determine whether the en
    14·1 answer
  • Write a recursive method named binarySearch that accepts a sorted array of integers and an integer target value and uses a recur
    6·1 answer
  • Upgrading only the motherboard will give some performance improvement to a computer system. Why would the improvement be limited
    14·1 answer
  • How read binary file in c++
    7·1 answer
  • Which is the correct sequence of steps for opening a new document?
    10·2 answers
  • What is anatomy of software house?
    10·1 answer
  • Mathematical expression that might link numbers in cells
    14·1 answer
  • 1. provide at least 3 properties and 3 methods of the object computer.
    8·1 answer
  • Demonstrate the register addressing mode for the following instructions. Also what addressing mode belongs to these instructions
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!