1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveticcg [70]
3 years ago
6

What type of decision problems can be solved by using Business Intelligence (BI)?

Computers and Technology
1 answer:
spayn [35]3 years ago
7 0

Answer:

BI helps a business owner do the most important task, measure what is working and what is not working in your business.

Explanation:

You might be interested in
Write a program with a function that accepts a string as an argument and returns a copy of the string with the first character o
Alex Ar [27]

Answer:

def capitalize_first(st):

   capitilized_list = []

   splitted_st = st.split(". ")

   for x in splitted_st:

       capitilized_list.append(x[0].capitalize() + x[1:])

   capitilized_st = ". ".join(capitilized_list)

   return capitilized_st

 

s = input("Enter a string: ")

print(capitalize_first(s))

Explanation:

Create a function called capitalize_first that takes one parameter, st

Create an empty list that will hold the capitalized strings

Split the given string using split function and put them in the splitted_st

Create a for loop that iterates through splitted_st. For each string in splitted_st, capitalize their first character and put them in the capitalized_list.

When the loop is done, join the strings in the capitalized_list using join function and set the joined string to capitilized_st

Return the capitilized_st

Ask the user for the string

Call the function with entered input and print the result

7 0
3 years ago
Readability is the level of vocabulary used on the page. True or false
konstantin123 [22]

Answer:

FALSE....john has no idea what hes talking about. i knew this was false yet i looked it up and got it wrong anyway because of john its freaking false

Explanation:

8 0
3 years ago
Describe at least two ways social media has impacted cybersecurity.
dybincka [34]

Answer:

Its Providing Too Much Personal Information since you will be using social media to promote your own small business, you need to take extra precautions. For starters, don’t leave a trail of breadcrumbs for social media hackers. Whether you are representing yourself or your company, avoid sharing stuff like your date of birth, places where you have attended school, as well as names and pictures of your family members.

Disgruntled Employees

While it’s fairly normal for your employees to vent about working for your company, in doing so, they may inadvertently reveal more than they should. It’s a lot more common than you think, since 98% of all employees are using at least one social media platform, and as much as 50% of those are talking about their respective companies. Whether they are sharing sensitive info or posting pictures from their workplace, they may end up sharing something that might hurt your business.

Explanation:

7 0
3 years ago
Should you ever force a CPU into<br>its socket?​
tatyana61 [14]

Answer:

no you should not force a cpu into its socket.

Explanation: on an intel platform the pins are on the motherboard, therefore if you force it in it will damage the pins on the motherboard, and on AMD the pins are on the cpu itself so you can damage the extremely fragile pins on it, you can not shock your cpu however like the other answer.

7 0
3 years ago
Which action should you take when sending a large attachment?
lana66690 [7]
CamScanner app is helpful for that
4 0
4 years ago
Read 2 more answers
Other questions:
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • Operating systems such as Microsoft Windows use a specific character before a file extension to separate it from the filename. W
    9·2 answers
  • Please help!!!!<br> Data means only facts. <br> A. TRUE B. FALSE
    14·1 answer
  • Compare a Wi-Fi hotspot with a cybercafé.
    6·1 answer
  • Why does world of tanks keep downloading when I'm not even at the computer
    9·1 answer
  • Lines, block arrows, stars, and banners are examples of which of the following
    6·1 answer
  • What are 6 steps to take to figure out what's wrong with your computer?
    5·1 answer
  • IPv6 is being developed in order to:
    15·1 answer
  • which two functions are performed at the llc sublayer of the osi data link layer to facilitate ethernet communication? (choose t
    13·1 answer
  • How could this code be simplified?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!