Name the five automated information systems - The Vendors

Answers

Answer 1

Answer:

The computer age introduced a new element to businesses, universities, and a multitude of other organizations: a set of components called the information system, which deals with collecting and organizing data and information.

An information system is described as having five components.

1- Computer hardware. This is the physical technology that works with information.

2- Computer software. The hardware needs to know what to do, and that is the role of software.

3- Telecommunications.

4- Databases and data warehouses.

5- Human resources and procedures.

Explanation:

Computer hardware

This is the physical technology that works with information. Hardware can be as small as a smartphone that fits in a pocket or as large as a supercomputer that fills a building. Hardware also includes the peripheral devices that work with computers, such as keyboards, external disk drives, and routers. With the rise of the Internet of things, in which anything from home appliances to cars to clothes will be able to receive and transmit data, sensors that interact with computers are permeating the human environment.

Computer software

The hardware needs to know what to do, and that is the role of software. Software can be divided into two types: system software and application software. The primary piece of system software is the operating system, such as Windows or iOS, which manages the hardware’s operation. Application software is designed for specific tasks, such as handling a spreadsheet, creating a document, or designing a Web page.

Telecommunications

This component connects the hardware together to form a network. Connections can be through wires, such as Ethernet cables or fibre optics, or wireless, such as through Wi-Fi. A network can be designed to tie together computers in a specific area, such as an office or a school, through a local area network (LAN). If computers are more dispersed, the network is called a wide area network (WAN). The Internet itself can be considered a network of networks.

Databases and data warehouses

This component is where the “material” that the other components work with resides. A database is a place where data is collected and from which it can be retrieved by querying it using one or more specific criteria. A data warehouse contains all of the data in whatever form that an organization needs. Databases and data warehouses have assumed even greater importance in information systems with the emergence of “big data,” a term for the truly massive amounts of data that can be collected and analyzed.

Human resources and procedures

The final, and possibly most important, component of information systems is the human element: the people that are needed to run the system and the procedures they follow so that the knowledge in the huge databases and data warehouses can be turned into learning that can interpret what has happened in the past and guide future action.


Related Questions

How are radio waves used on Earth?

Select ALL that apply
a

Traditional Radio Wave
b

Wireless Internet
c

Cell Phones
d

Light House

Answers

Answer:

A,B,C are the answers it cant be light house because it uses stored electricity which projects light energy

C and d If it’s not late yet. Not sure why they would put A tho kind of through me off

Franklin gave a presentation without any help from others. He didn't smile, and he looked at the floor during the presentation. What could Franklin have done to improve his presentation?
a Added more images to his slides to add engagement
b Asked for someone else to do the research for him
c Practiced in front of a trusted adult and asked for feedback
d Read the information right from the slides

Answers

Answer:

C. Practiced in front of a trusted adult..

Answer:

Practiced in front of a trusted adult and asked for feedback

Explanation:

Why data mining is crucial for the success of a business, explain with examples

Answers

Answer:

For businesses, data mining is used to discover patterns and relationships in the data in order to help make better business decisions. Data mining can help spot sales trends, develop smarter marketing campaigns, and accurately predict customer loyalty.

PLZ HELP

Select the correct answer.
Jack is part of the software quality assurance team in a company. Which activity should Jack perform as a part of software quality assurance?
A.
billing
B.
recruiting
C.
testing
D.
installing
E.
accounting

Answers

Answer:

E. accounting

Explanation:

just bare with me

Answer:D SORRY IF IM WRONG

Explanation:

PLS DONT HATE

The ribbon in Excel is a
tab based user interface.
True
False

Answers

Answer:

Explanation:

This should help i think it is true just read this first "Like any other application, Excel has a basic workspace called the user interface. ... The Ribbon is the name given to the row of tabs and buttons you see at the top of Excel. The Ribbon's tabs and buttons bring your favorite commands into the open by showing multiple commands grouped in specific categories."

Answer:

True

Explanation:

Digital computers use a........ system to encode date and programs.

Answers

Answer:

Digital computers use a binary system to encode date and programs.

Q17. The most commonly used storage device is....
A. Steel
B. Optical
C. Magnetic
D. Flash
Q18. A DVD is an example of a (n).....
A. Hard Disk
B. Optical Disk
C. Output Device
D. Solid-State Storage Device​

Answers

Answer:
Q17. Ans: Magnetic

Q18. Ans: Optical Disk

Explanation:

magnetic storage devices, such as hard disk drives. optical storage devices, such as CD, DVD and Blu-ray discs. solid state storage devices, such as solid state drives and USB memory sticks.

The DVD (common abbreviation for Digital Video Disc or Digital Versatile Disc) is a digital optical disc data storage format

Write a program that creates a two-dimensional array initialized with test data. Use any data type you wish. Declare a two-dimensional array of data type char, int, double, or string. Assume the array is declared as follows: const int NUM_ROWS

Answers

Question:

Write a program that creates a two-dimensional array initialized with test data. Use any data type you wish. Declare a two-dimensional array of data type char, int, double, or string. Assume the array is declared as follows:  

const int NUM_ROWS = 3,  NUM_COLUMNS = 5;

test data: [10, 1, 1, 1, 1]  [7, 2, 20, 2, 9] [ 3, 3, 3, 3, 5]

Answer:

The program in C++ is as follows:

#include<iostream>

using namespace std;

int main(){

const int NUM_ROWS = 3, NUM_COLUMNS = 5;

int MyArray[NUM_ROWS][NUM_COLUMNS] = {{10, 1, 1, 1, 1},{7, 2, 20, 2, 9},{3, 3, 3, 3, 5}};

return 0;

}

Explanation:

To answer this question, we make use of the following parameters

Array name: MyArray

Array datatype: integer

The explanation is as follows:

This declares the array dimensions

const int NUM_ROWS = 3,  NUM_COLUMNS = 5;

This declares and initializes the array with the test data

int MyArray[NUM_ROWS][NUM_COLUMNS] = {{10, 1, 1, 1, 1}, {7, 2, 20, 2, 9}, {3, 3, 3, 3, 5}};

A customer opened a file attachment, and now her PC is infected with ransomware. She's unable to open any of her files. Which action would you take first?
A. Reinstall the operating system
B. Run an antivirus scan
C. Pay the ransom to recover the data
D. Disconnect the PC from the network
E. Restore files from backup

Answers

Answer:

D. Disconnect the PC from the network

Explanation:

I'd say this because it keeps the ransomware from spreading to other computers making it a bigger problem.

In this question, the answer is "Option D", which disconnects the PC from the network, which can be defined as follows:

A customer's PC has been attacked using ransomware after she opened a document file. She has been unable to access any of her files. She first had to detach the PC from the system to access the file.This type of malicious software (malware) threatens to publish or prevent information or computer access until the victim pays a ransom price to the attacker. Today, ransomware assaults are all too frequent. This attacker then demands a ransom from the victim, promising to restore access to the information in exchange for payment.

The wrong option can be defined as follows:

In option a, it is wrong because when we reinstalling the OS is used to start the fresh without using the old files.In option b, it is wrong because the antivirus can't protect the ransomware maliciously. In option c, it is wrong because when a corporation can pay the ransom, their cash is dispersed across the dark web.In option e, it is wrong because creating copies of information could be recovered in the event of a primary information failure.

Learn more:

Ransomware: brainly.com/question/14455233

PLZZZ HELP!!!!!!!
Select the correct answer.
Which of these examples best describes unit testing?
A.
The tester finds incorrect functionality on the home page.
B.
The login page does not accept existing user credentials.
C.
There is no database connectivity.
D.
The developer checks the loops in the procedure.
E.
Multiple users slow down the speed of the system.

Answers

Answer: A is the correct choice.

The option that is an example that describes unit testing is the developer checks the loops in the procedure.

What is unit testing?

This type of test is known to be called unit component. It is regarded as a form of a single function or code of any kind of application.

Conclusively, A good example that tells more about unit testing is the when a developer monitors the loops in the procedure so as to see if there is any error or omissions.

Learn more about unit testing  from

https://brainly.com/question/24964187

Can someone please help me answer these questions plz

Answers

Explanation:

0001, 0010, 0101, 0110, 0111, 1000

Jerry purchased 25 dozens of eggs. He used 6 eggs to bake 1 cake. How
many similar cakes can Jerry bake with the number of eggs he purchased?​

Answers

Answer:

50

Explanation:

He bought 25 dozens of eggs:

25 (12) = 300

He used 6 eggs to make 1 cake, so:

300 eggs/6 eggs per cake = 50 cakes

HELP! WILL GIVE BRANLIESt!

Answers

Answer:

36:12, 36/12, 3/1

Explanation:

I’ve never solved a problem like this but mathematically this answer makes sense

You want to change your cell phone plan and call the company to discuss options

Answers

And? What’s the point? The question?

PLEASEE HELPP.... QUESTION... how does coding impact your life​

Answers

Answer: It allows us to do everyday tasks on the internet

Explanation: We wouldn’t be able to email, research, etc without coding!

It helps us use things such as the internet, TVs and many other things coding is a Vidal asset in are everyday life.

WHAT DO YOU LEARN IN CODE.ORG​

Answers

Answer:

You learn how to animate and make websites

Explanation:

how to make websites and code/program games!!

Writing a function that implements a loop to collect a set amount of data. The function should use the serial object, the recording time, and the iteration (city number) as input arguments and return an N x 2 array with the time in the first column and the recorded light level in the second. (4 pts). Include in this function outputs to the Command Window noting the starting and stopping of the recording.

Answers

You can still go on a date with you if I get a text from my friend that is in a relationship and you don’t know why

NEED HELP ASAP! Which field best organizes street addresses in a database?
A. Name
B. Address
C. Phone

Answers

The best one is name

Mattias's friend asked him to critique his presentation about gorillas. Mattias noticed that there weren't any images of gorillas. What feedback can Mattias give to improve his friend's presentation?
a I like your title, but did you not think to add pictures of gorillas?
b It's ok, but it would be better if I just added pictures to your presentation.
c Really great information, but I think adding a picture of a gorilla would be great.
d You're missing a gorilla picture. Add one.

Answers

Answer:

c

Explanation:

Answer:B

Really great information, but I think adding a picture of a gorilla would be great.

Explanation:

Mattias's friend asked him to critique his presentation about gorillas. Mattias noticed that there weren't any images of gorillas. What feedback can Mattias give to improve his friend's presentation?

Group of answer choices

A)You're missing a gorilla picture. Add one.

B)Really great information, but I think adding a picture of a gorilla would be great.

C)I like your title, but did you not think to add pictures of gorillas?

D)It's ok, but it would be better if I just added pictures to your presentation.

Write a program that prompts the user to enter their name store this value in a variable called name Prompt the user for their current age store this value in a variable called Create a variable dogAge which takes the age entered and multiplies by 7 Print to the screen “Your name is" name "and in dog years you are" dogAge "years old" To join multiple parts together in a print statement use commas: print (“Your name is", name, "and in dog years you are", dogAge)​

Answers

Answer:

Explanation:

The following code is written in Python. It prompts the user for the name and age, saves them to their own variables. Then it creates and calculates the dogAge variable. Finally, it combines all of this information and prints out the statement.

name = input("Enter your name: ")

age = input("Enter your age: ")

dogAge = int(age) * 7

print("Your name is", name, "and in dog years you are", dogAge, "years old.")

⚠️⚠️⚠️⚠️⚠️⚠️Help! What is not an advantage of using virtual machines?
You can run multiple operating systems on one physical machine.

It doesn’t take up any storage space on the physical machine.

You can save the entire state of a VM to your files.

Provides fault and security isolation for the computer’s hardware

Answers

Answer:

It doesn’t take up any storage space on the physical machine.

Explanation:

The virtual machine does take up some storage space on the physical machine.

Return the appropriate part of FizzBuzz This is a small part of a classic software engineering interview question. fizz_buzz_check takes a single integer argument, number. Complete the function such that it returns a value using the following rules: If the number is divisible by 3 (i.e division by 3 has a remainder of 0), return the string Fizz. If it is divisible by five, return the string Buzz. If it is divisible by 3 AND 5, return FizzBuzz. Otherwise, just return the original argument back without any changes.

Answers

Answer:

The function in Python:

def fizz_buzz_check(num):

   if num%3 == 0:

       result = "Fizz"

   if num%5 == 0:

       result = "Buzz"

   if num%3 == 0 and num%5 == 0:

       result = "FizzBuzz"

   if num%3 != 0 and num%5 != 0:

       result = num

   return result

Explanation:

The function to complete is not given. So, I write a new function from scratch.

This defines the function

def fizz_buzz_check(num):

This checks if num is divisible by 3

   if num%3 == 0:

If yes, the returned value is stored as "Fizz"

       result = "Fizz"

This checks if num is divisible by 5

   if num%5 == 0:

If yes, the returned value is stored as "Buzz"

       result = "Buzz"

This checks if num is divisible by 3 and 5

   if num%3 == 0 and num%5 == 0:

If yes, the returned value is stored as "FizzBuzz"

       result = "FizzBuzz"

This checks if num is not divisible by 3 and by 5

   if num%3 != 0 and num%5 != 0:

If yes, the returned value is stored as the initial argument

       result = num

This returns the appropriate value

   return result

Write a Python function that takes as input a list, A, and returns two lists L and G. L constains all numbers in A, which are not A[0] and are less than or equal to A[0]. G contains all numbers in A, which are not A[0], and are greater than A[0].

Answers

Answer:

In Python:

def split(A):

   L=[]; G=[]

   for i in range(1,len(A)):

       if (A[i] != A[0] and A[i] < A[0]):

           L.append(A[i])

       if (A[i] != A[0] and A[i] > A[0]):

           G.append(A[i])

   return L, G

Explanation:

This defines the function

def split(A):

This initializes the L and G lists

   L=[]; G=[]

This iterates through the original list A

   for i in range(1,len(A)):

This populates list L using the stated condition

       if (A[i] != A[0] and A[i] < A[0]):

           L.append(A[i])

This populates list G using the stated condition

       if (A[i] != A[0] and A[i] > A[0]):

           G.append(A[i])

This returns the two lists L and G

   return L, G

NO LINKS
Do you need to pay monthly to stream on Twitch?

Answers

I think so yeah $$$$

Let's talk about this cryptocurrency: Vechain (VET)​

Answers

Answer:

This is gonna be interesting

My teacher just asked, "What did you learn about coding and how can it help u through life." CAN SOMEONE PLZ ANSWER BC I DONT KNOW.​

Answers

Answer:

Coding is becoming a big thing in America because more and more jobs are on the computer, because they future is tech.

Explanation:

i dont know something like tht

Order the steps for creating and assigning a new task in Outlook 2016.
Choose a task list, and
Open the Task view.
Click Assign Task, and
Complete the task
Click Send.
click New Task
specify the assignee.
information
Intro
Done

Answers

Answer:

Open the task viewChoose a task list and click new taskcomplete the task information click assign task and specify the assigneeclick send

Explanation:

Got it right on edge

How can you get feedback on your presentation from someone who is far away?
a Email your PowerPoint notes to the person.
b Explain your topic over the phone.
c Record your presentation and send it to them.
d Send them your PowerPoint slides.

Answers

Answer:

C. Record your presentation...

I think this because if you want feedback you would definetly talk and record your presentation so the person can give you a clear response

it’s C it makes sense

Select the correct answer.
Who takes care of the final layout of the product that meets the standards set by UX designers?
O A web developer
ОВ.
design director
OC. UX designer
OD. UI designer
Reset
Next
Hi

Answers

Answer:

UI designer

Explanation:

For questions 3-6, consider the following two-dimensional array:

undervalue

will

knitting

pretzel

realize

honey

planetary

bandana

iron

employment

effort

fabric


What word is in [0][1] ?


Flag this Question
Question 41 pts
What word is in [1][1] ?

Flag this Question
Question 5
What word is in [3][2] ?

Flag this Question
Question 6
What word is in [2][1] ?

Answers

Answer:

3. Will

4. Realize

5. Fabric

6. Bandana

Realize is in is in [1][1], Fabric is in [3][2], Bandana is in [2][1] . Arrays inside of arrays are what are known as two-dimensional arrays.

What is two-dimensional array?

Arrays inside of arrays are what are known as two-dimensional arrays. 2D arrays, which are made up of rows and columns, are constructed as metrics. To create a database that resembles the data structure, 2D arrays are frequently used.

You may store a large amount of data using 2d arrays at once, which can then be supplied to as many different functions as necessary. Two indices are used to refer to the position of the data element in two-dimensional or multi-dimensional arrays. Row and column are the two dimensions indicated by the name. Realize is in is in [1][1], Fabric is in [3][2], Bandana is in [2][1] .

Therefore, realize is in is in [1][1], Fabric is in [3][2], Bandana is in [2][1].

To know more about two-dimensional array, here:

https://brainly.com/question/30463245

#SPJ3

Other Questions
For the siphon shown in Figure, determine the flowrate out of the siphon and the absolutepressure at the crest of the siphon assuming that there is no losses through the pipe.2.00 mDel50-mm-diameterOil (s.g. =0.82)5.00 m Please I beg you, to not put links if you dont know dont do it. Its a lot of points. Complete everything it says Can some show the steps and the answer please I really need help tell me how you get it and the answer What is the domain of f(x) = 9 - x^2 100 POINTSI am asking 2 questions because im giving so many points... 1. Describe the first hypothesis that scientists have about blindness in the Mexican tetra. Be sure to discuss pleiotropy in your answer.\2. One effect of the Hedgehog gene is to make cave tetras go blind. What is another effect it might have? Stephany is inviting 3 friends to a party. If each friend will get 7 cookies and each box has 10 cookies, how many boxes does Stephany need to get? WORTH 20 POINTS! GIVING BRAINLIEST InstructionsIn this experiment, you will be using two different coins as a simulation for a real-world compound event.Suppose that a family has an equally likely chance of having a cat or a dog. If they have two pets, they could have 1 dog and 1 cat, they could have 2 dogs, or they could have 2 cats.What is the theoretical probability that the family has two dogs or two cats?Describe how to use two different coins to simulate which two pets the family has.Flip both coins 50 times and record your data in a table like the one below.Result FrequencyHeads, Heads Heads, Tails Tails, Heads Tails, Tails Total 50Based on your data, what is the experimental probability that the family has two dogs or two cats?If the family has three pets, what is the theoretical probability that they have three dogs or three cats?How could you change the simulation to generate data for three pets? Espaol: Es tiempo de que elabores en tu cuaderno el borrador de tu carta de opinin, en la cualcuenta los siguientes puntos:- Lugar y fecha- Destinatario- Saludo- Inicio (presenta los hechos, el problema o el tema a tratar.)- Desarrollo o cuerpo (expone una opinin personal sustentada con argumentos sobre los hechos presentados alinicio.)Cierre (Emite un juicio de valor y se ofrece una recomendacin) - Despedida Firma del autor PLEASE ANSWER ASAP! Ty! Which number is an outlier in the data set? Explain what effect the outlier has on the measures of center and spread. According to the scatter plot shown, what approximate income should a 24-year old have?Income45,00040.00035,00030,00025.00020,00015,00010,0005,000O16 18 20 22 24 26 28 30 32Age$35,000$25,000$20,000$30,000 true or false? aging is a normal process that lead to normal changes in body structure and function What is the equation of a line with a slope of -1 and a y-intercept of -5?A. y=-x-5B. y=-x + 5C. y = -5x-1D. y=-5x+1 In a magic square, the sum of the numbers in any row, column, or diagonal is the same. The square below is a magic square. Two of the numbers were taken out and three were covered by the letters A, B, and C. What is the value of A + B + C?a.14b.25c.Impossible to telld.41e.30 At Tasty Dogs, 2 of the last 12 customers wanted mustard on their hot dogs. Considering this data, how many of the next 6 customers would you expect to want mustard? explain the challenges Israel is facing with implementing vaccine passports. Also explain what issues poorer countries like Palestine are facing with getting vaccines. Do you think people in rich countries must get vaccinated? How can we help countries that have poor health services get vaccinated? If youre fluent in Spanish plz help Ivan has a sticker collection. 2/5 of his stickers are scratch-and-sniff stickers. 1/4 of his scratch-and-sniff stickers smell like bananas. What fraction of Ivan's sticker collection smells like bananas? * Three reasons WHY Malta has a high HDI??plss help its important Find the area of the parallelogram.15 cm8 cm[ ? ] square centimetersEnter MathA cookie cutter shark is 0.4 meter long, and a threshershark is 6 meters long. How many times as long as thecookie cutter shark is the thresher shark?