1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NNADVOKAT [17]
2 years ago
11

Which of the mis systems uses both informal and formal information-gathering procedures?

Computers and Technology
1 answer:
Troyanec [42]2 years ago
7 0

A management information system (MIS) which uses both informal and formal information-gathering procedures is: a. Marketing intelligence system.

<h3>What is an information system?</h3>

An information system (IS) can be defined as a collection of computer systems and Human Resources (HR) that is used by a business organization or manager to obtain, store, compute, and process data, as well as the dissemination (communication) of information, knowledge, and the distribution of digital products from one location to another.

In Business management, marketing intelligence system is a type of information system (IS)  which is designed and developed to uses both informal and formal information-gathering procedures to obtain strategic information from the marketplace.

Read more on marketing intelligence system here: brainly.com/question/14951861

#SPJ1

Complete Question:

Which of the MIS systems uses both informal and formal information-gathering procedures?

a. Marketing intelligence system

b. External environment reports system

c. Internal reports system

d. Consumer information support system

You might be interested in
Name any two objectives of a business​
olga nikolaevna [1]

Explanation:

Growth – Another important objective of business is to achieve growth. The growth should be in terms of increase in profit, revenue, capacity, number of employees and employee prosperity, etc.

Stability – Stability means continuity of business. An enterprise or business should achieve stability in terms of customer satisfaction, creditworthiness, employee satisfaction etc. A stable organization can easily handle changing dynamics of markets.

6 0
3 years ago
What is computer virus​
IRINA_888 [86]

Answer:

A type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.

Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.

8 0
3 years ago
Read 2 more answers
What are the common causes of signal loss in fiber optic cable connectors
timurjin [86]
Bending, twisting, or the overall age of the cable, or other stuff like that.
8 0
3 years ago
Polygon transform (25 points). Write a library of static methods that performs various geometric transforms on polygons. Mathema
kari74 [83]

Answer:

import java.lang.*;               //for using Math.cos() and Math.sin() and Math.toRadians() funcitons in rotate method

public class PolygonTransform

{

  public static double[] copy(double[] array)

  {

      double[] newArray = new double[array.length];

      for(int i=0;i<array.length;i++)

      {

          newArray[i] = array[i];

          return newArray;

      }

  }

  public static void scale(double[]x,double[]y,double alpha)

  {

      for(int i=0;i<x.length;i++)

      {

          x[i] *= alpha;

          y[i] *= alpha;

      }

  }

  public static void translate(double[]x,double[]y,double dx,double dy)

  {

      for(int i=0;i<x.length;i++)

      {

          x[i] += dx;

          y[i] += dy;

      }

  }

  public static void rotate(double[] x, double[]y,double theta)

  {

      double rad = Math.toRadians(theta);

      double temp;

      for(int i=0;i<x.length;i++)

      {

          temp = x[i];                           //For storing temporarily the previous value of x before changing so tha it can be used in changing y

          x[i] = x[i]*Math.cos(rad) - y[i]*Math.sin(rad);

          y[i] = y[i]*Math.cos(rad) + temp*Math.sin(rad);  

      }

  }

  public static void main(String args[])

  {

      //This is just implementing you testcase discripted.

      double[]x = new double[4];

      double[]y = new double[4];

      StdDraw.setScale(-5.0, +5.0);

      x = { 0, 1, 1, 0 };

      y = { 0, 0, 2, 1 };

      double alpha = 2.0;

      StdDraw.setPenColor(StdDraw.RED);

      StdDraw.polygon(x, y);

      scale(x, y, alpha);

      StdDraw.setPenColor(StdDraw.BLUE);

      StdDraw.polygon(x, y);

      // Translates polygon by (2, 1).

      StdDraw.setScale(-5.0, +5.0);

      x = { 0, 1, 1, 0 };

      y = { 0, 0, 2, 1 };

      double dx = 2.0, dy = 1.0;

      StdDraw.setPenColor(StdDraw.RED);

      StdDraw.polygon(x, y);

      translate(x, y, dx, dy);

      StdDraw.setPenColor(StdDraw.BLUE);

      StdDraw.polygon(x, y);

      // Rotates polygon 45 degrees.

      StdDraw.setScale(-5.0, +5.0);

      x = { 0, 1, 1, 0 };

      y = { 0, 0, 2, 1 };

      double theta = 45.0;

      StdDraw.setPenColor(StdDraw.RED);

      StdDraw.polygon(x, y);

      rotate(x, y, theta);

      StdDraw.setPenColor(StdDraw.BLUE);

      StdDraw.polygon(x, y);

  }

}

Explanation:

6 0
3 years ago
Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
SCORPION-xisa [38]

Answer: Snort

Explanation:Snort is a system which provides the service of the prevention of the intrusion. This system works as the open source for provision of the logging of packets and traffic analysis.

The functions in the snort are analysis of the protocol, content matching , searching etc. The main purpose of it is for the detection of the attack like stealth port ,CGI attacks etc.Other options are incorrect because they don't provides attack detection service.Thus the correct option is snort.

3 0
3 years ago
Other questions:
  • Which is the highest level of the hierarchy of needs model?
    5·2 answers
  • A company that offers services for accessing and using the Internet is: *
    10·1 answer
  • What activities are the most likely to infect your computer with a virus? Check all that apply
    11·2 answers
  • How is a computer component, such as a network card, commonly marked for identification?
    13·1 answer
  • A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
    7·1 answer
  • You have just built a new system from scratch. you turn the computer on but the system boot fails and sounds a beep code. what m
    15·1 answer
  • A ____ is used to perform a forward-only (sequential) access of the data in the data source while a ____ is used to populate a d
    11·1 answer
  • Why must a mobile application be easily customized and personalized?
    14·2 answers
  • I need help solving this problem on Picoctf. The question is What happens if you have a small exponent? There is a twist though,
    7·1 answer
  • All variables are----------------------------------------------- help please
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!