1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
4 years ago
14

Francis works in the human resources division of a large oil and gas company in Texas. Francis' tasks include maintaining payrol

l and vacation records, employment histories, and benefit information along with ensuring the security of all sensitive employee information. Which MIS infrastructure is most important to Francis?
Computers and Technology
1 answer:
KiRa [710]4 years ago
4 0

Answer: Information MIS infrastructure

Explanation: Information MIS infrastructure is the company model that is used for supporting the task functioning . The main aim of this tool is to be used in backing -up , plan of diasater recovery and plan of business continuity.

These objectives are achieved by availability, portability , scalability , accessibility, maintainability etc characteristic. Francis is also involved in information MIS infrastructure by maintaining the payroll, records,history of employment  etc, securing the information,etc.

You might be interested in
Hiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
Marianna [84]

Answer:

hello

Explanation:

how are you?

7 0
3 years ago
A sense of scale tells us what about the objects in a picture?
monitta

Answer:

A. the size

Explanation:

7 0
3 years ago
Read 2 more answers
10. Question<br> Which statement is true about computer security?
Snowcat [4.5K]

Answer:

they cannot share your privacy with others without your concern

7 0
3 years ago
A DDos attack _____________.
melomori [17]

Answer:

Option (1) the is correct answer for the above question.

Explanation:

"DDos" stands for distributed denial-of-service. It is a type of attack which affects the network route. It disturbs the normal route like a traffic Jam. It operators from some hosts point and act after getting access to the system in an unauthorized way.

It attacks to disturb the service provided by the other system. It authorized the hosts' system and entered into the system to get disturb the routine of the system.

  • Option 1 also suggests the same hence it is a correct option.
  • While option 2 suggests that it is a software, but it is a concept that means to disturb the normal routine of the system and he can get that information access which is transmitted over the signals. hence option 2 is not fit for the question.

4 0
3 years ago
Which of the following is a quantitative question?
slamgirl [31]
D it gives 2 options
3 0
3 years ago
Read 2 more answers
Other questions:
  • All of the following are types of data storage devices except CD/DVD computer monitor digital cameras flash drive
    15·1 answer
  • How do rubrics increase learning?
    15·2 answers
  • QUESTION 1 Someone may choose to own a car instead of leasing because: AThe car can be resold later to make some money back. BTh
    9·1 answer
  • 1) What is Net beans
    6·1 answer
  • Design a 4-to-16 line Decoder by using the two 3*8 decoder-line decoders. The 3-to-8 line decoders have an enable input ( '1' =e
    13·1 answer
  • Which of the following modes of replication requires a very low latency network connection and ensures data remains in synch wit
    5·1 answer
  • A technician is troubleshooting a small network with cable Internet service in which a user is receiving a message in her web br
    7·1 answer
  • When operating a forklift, you should always maintain what kind of speed? A. High Speed B. Low Speed C. Medium Speed
    8·1 answer
  • Create a class called Hangman. In this class, Create the following private variables: char word[40], progress[40], int word_leng
    11·1 answer
  • Who made the first electronic device?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!