1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
2 years ago
5

_____ oversee the work of various types of computer professionals and must be able to communicate with people in technical and n

ontechnical terms.
Computers and Technology
1 answer:
viktelen [127]2 years ago
4 0

Systems analysts oversee the work of various types of computer professionals and  communicate with people in technical and nontechnical terms.

<h3>Who works in an information systems?</h3>

The information systems field is known to be made up of people in a firm who set up and build information systems, the individuals who use those systems, and the people who are known to managing them.

Note that there is high demand for IT staff whose common example includes programmers, business analysts, systems analysts, etc.

Learn more about computer from

brainly.com/question/24540334

You might be interested in
A plan budget time for studying and activities is referred to as?
Lady_Fox [76]

Answer:

sorry u got scamed

Explanation:

4 0
3 years ago
question 5 you need to find the internet protocol (ip) address for a website. which command do you use on a windows system?
xz_007 [3.2K]

To find the internet protocol (ip) address for a website, the command that will be used is nslookup. The correct option is B.

<h3>What is nslookup?</h3>

A "network administration command line" program known as nslookup is used to learn about the Domain Name System (DNS) and to obtain the records for various domain names. It is mainly employed for DNS Server troubleshooting. Through domain names, we can access information on the Internet.

In the center of the Domain Name System are these names. Internet Protocol addresses are used by web browsers on the Internet to communicate with one another.

Therefore, the correct option is B, nslookup.

To learn more about nslookup, refer to the link:

brainly.com/question/14286524

#SPJ1

The question is incomplete. Your most probably complete question is given below:

A) Ipconfig B) Nslookup C) Ping D) Tracert

6 0
1 year ago
The ________ view in access looks similar to an excel spreadsheet.
ch4aika [34]
Datasheet 
<span>The datasheet view in access looks similar to an excel spreadsheet.</span>
6 0
3 years ago
What are the six peripherals of a computer system
Lubov Fominskaja [6]
Peripherals fall into three categories:
1. input devices are devices that put commands inside computers such as keyboards, mouses, and joysticks but the first two are the mostly used nowadays
2. output devices are what computers give out such as monitors, printers, speakers and I think projectors also fall into that category
3.storage devices such as a optical drive, hard drive, SDD, flash drive
So the main ones might be a mouse, keyboard, monitors, I think printers, hard drives and flash drives but speakers might be considered as one instead of a flash drive.

4 0
3 years ago
How many bits are necessary for a binary representation (unsigned) of:
pshichka [43]

Answer:

Hi!

The answer to:

a. 6 bits.

b. 9 bits.

c. 26 bits.

Explanation:

a. For the states of the U.S.A, you need 50 or more combinations to represents each element.

<u>If you use 6 bits, the possible combinations are 2⁶ = 64.  </u>

b. For days in a year, you need 365 or more combinations to represents each element.

<u>If you use 9 bits, the possible combinations are 2⁹ = 512. </u>

c. For inhabitants of California, you need 36,457,549 or more combinations to represents each element.

<u>If you use 26 bits, the possible combinations are 2²⁶ = 67,108,864.</u> If you use 25 bits instead of 26, then you have 2²⁵ = 33,554,432 combinations. These possible combinations are not enough to represent each inhabitant.

4 0
3 years ago
Other questions:
  • Candace opened an email from a person she didn't know and clicked on a pop-up in the email that installed a virus on her compute
    8·2 answers
  • Explain the term remote backup with examples.​
    5·1 answer
  • . Once a vulnerability has been identified by Nessus, where would you check for more information regarding the identified vulner
    15·1 answer
  • Suppose arraylist list1 is [1, 2, 5] and arraylist list2 is [2, 3, 6]. after list1.addall(list2), list1 is __________.
    8·1 answer
  • What is the benefit of an arch in a building design? It permits architects to build taller structures. It allows architects to c
    14·1 answer
  • Muultimedia Promo try answer this question and explaining them or give examples of that topic Thanks
    10·1 answer
  • Resize vector countDown to have newSize elements. Populate the vector with integers {newSize, newSize - 1, ..., 1}. Ex: If newSi
    6·1 answer
  • What are other ways you could use the shake or compass code blocks in physical computing projects?
    14·1 answer
  • Is an electronics standard that allows different kinds of electronic instruments to
    12·1 answer
  • What would the internet be like today if there was no World Wide Web?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!