Which of the following is external to a firm and exists independently of a company?
A. Strengths
B. Weaknesses
C. Goals
D. Core competencies
E. Opportunities
Answer: E
You might also like to view...
Which of the following is a level of the database that is defined by the data definition language?
a. user view b. schema c. internal view d. all are levels or views of the database
Resources permitting, one should conduct additional focus groups until the participants can anticipate what will be said
Indicate whether the statement is true or false
In a deferred payment arrangement, interest is charged only if it is stated
Indicate whether the statement is true or false
Keith, with his three other friends, sends email messages to people that appear to come from a legitimate business, such as a bank, credit card company, or retailer. With these official looking emails, they trick people to disclose their personal information such as passwords, usernames, and account numbers. In this scenario, Keith and his friends are involved in _____.
A. hacking B. phishing C. pharming D. viral marketing