The major phases in goals-based strategic planning are: analyze situation, set direction, define strategies, and deploy plan. All levels and business units of an organization must be involved in assessing its strengths and weaknesses. Preparing a historical perspective that summarizes the company’s development is an excellent way to begin the first phase of strategic planning.

a. To track the progress of organization’s goals and objectives
b. To create a set of strategies that will garner committed supporters across the organization
c. To identify and analyze key issues faced by the organization
d.To prepare a historical perspective that summarizes the organization’s development


d.To prepare a historical perspective that summarizes the organization’s development
The major phases in goals-based strategic planning are: analyze situation, set direction, define strategies, and deploy plan. All levels and business units of an organization must be involved in assessing its strengths and weaknesses. Preparing a historical perspective that summarizes the company’s development is an excellent way to begin the first phase of strategic planning.

Computer Science & Information Technology

You might also like to view...

When drawing the tree, systems analysts do not have to identify:

A) all outcomes. B) all actions. C) the order. D) all conditions.

Computer Science & Information Technology

Which of these is NOT a way to access Device Stage?

a. Select Control Panel from the Settings charm, and then select View devices and printers under the Hardware and Sound category. b. Right-click Start and choose Control Panel. Then select View devices and printers under the Hardware and Sound category. c. From the Search charm, type devices in the search field, and then select Devices settings. This option displays a vertical list of devices on the PC & devices screen. d. None of the above

Computer Science & Information Technology

In general terms, explain what happens when a router connection goes down on the Internet.

What will be an ideal response?

Computer Science & Information Technology

A _____ is an act intended to deceive or defraud users.

A. virus B. sniffer C. hoax D. hacker

Computer Science & Information Technology