1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crank
2 years ago
7

When the output (information) of an information system is used as new input it is called:____.

Computers and Technology
1 answer:
vfiekz [6]2 years ago
5 0

When the output (information) of an information system is used as new input it is called feedback.

<h3>What is information from a system that is used to make changes to the input?</h3>

The term feedback 'is seen as a form of output that is said to be used to make alterations to input or processing activities.

Note that a system is made up of the interrelated components that carry out a lot of tasks that is said to be perceived as feedback of the  information system.

Therefore, When the output (information) of an information system is used as new input it is called feedback.

Learn more about feedback from

brainly.com/question/25653772
#SPJ1

You might be interested in
What term refers to a device or software system that collects environmental information and makes independent decisions.
blondinia [14]

Answer: Environment sensing Collector

Explanation:

An environmental monitoring system or collectors is the process which a device uses in monitoring the quality of the environment. These devices or software allows for a realtime monitoring and checking of any parameter required. They are used to monitor and collect data on environmental conditions such as relative humidity, temperature, dew and frost point, differential pressure, pressure, flow, and many more.

6 0
3 years ago
Every command or instruction is called
Elza [17]

Answer:

statement........................

6 0
3 years ago
Read 2 more answers
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
How do you take a picture on this app
damaskus [11]
The paper clip.

Hope this helped.

Can i have brainliest?
8 0
3 years ago
How do i fix my this??
maksim [4K]

get a new monitor u cant


6 0
4 years ago
Read 2 more answers
Other questions:
  • Pointsyour company environment includes windows server versions 2003, 2008, and 2012. desktops range from windows xp and vista.
    13·1 answer
  • Every character is represented by a code. The ASCII code for upper letter A is 65 and for lower a is 97. Similarly the numeric c
    9·1 answer
  • Are the actions legal or illegal?
    13·1 answer
  • You can tell a cell is the active cell when it has a
    14·2 answers
  • HELP ASAP
    9·1 answer
  • TCP is the protocol responsible for the delivery of data on the Internet, and IP provides addresses and routing information.
    12·1 answer
  • Write the definition of a function printDottedLine, which has no parameters and doesn't return anything. The function prints to
    10·1 answer
  • - What are the different types of clients?
    12·1 answer
  • Write the implementation of a class Cse20 Topic that represents a topic in the cse20 class. The class should implement the init
    13·1 answer
  • Giving brainliest to the Person finishes this song lyric.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!