1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
4 years ago
14

Francis works in the human resources division of a large oil and gas company in Texas. Francis' tasks include maintaining payrol

l and vacation records, employment histories, and benefit information along with ensuring the security of all sensitive employee information. Which MIS infrastructure is most important to Francis?
Computers and Technology
1 answer:
KiRa [710]4 years ago
4 0

Answer: Information MIS infrastructure

Explanation: Information MIS infrastructure is the company model that is used for supporting the task functioning . The main aim of this tool is to be used in backing -up , plan of diasater recovery and plan of business continuity.

These objectives are achieved by availability, portability , scalability , accessibility, maintainability etc characteristic. Francis is also involved in information MIS infrastructure by maintaining the payroll, records,history of employment  etc, securing the information,etc.

You might be interested in
Please use thread to complete the following program: one process opens a file data.txt, then creates a thread my_thread. The job
Firlakuza [10]

Answer:

Here is the code:-

//include the required header files

#include<stdio.h>

#include<pthread.h>

// method protocol definition

void *count_lines(void *arg);

int main()

{

    // Create a thread handler

    pthread_t my_thread;

    // Create a file handler

    FILE *fh;

    // declare the variable

    int *linecnt;

    // open the data file

    fh=fopen("data.txt","r");

// Create a thread using pthread_create; pass fh to my_thread;

    pthread_create(&my_thread, NULL, count_lines, (void*)fh);

    //Use pthread_join to terminate the thread my_thread

    pthread_join( my_thread, (void**)&linecnt );

    // print the number of lines

printf("\nNumber of lines in the given file: %d \n\n", linecnt);

    return (0);

}

// Method to count the number of lines

void *count_lines(void *arg)

{

    // variable declaration and initialization

    int linecnt=-1;

    char TTline[1600];

    //code to count the number of lines

    while(!feof(arg))

    {

         fgets(TTline,1600,arg);

         linecnt++;

    }

    pthread_exit((void *)linecnt);

    // close the file handler

    fclose(arg);

}

Explanation:

Program:-

8 0
3 years ago
➪ How many types of Engineering are there in the world ?<br>⛄​​
aleksley [76]

There are mainly five types of engineers found in the world. Each of them has a different set of skills and knowledge concerning their relative field.

<h3>Who is called an Engineer?</h3>

An Engineer may be defined as an individual who formats, designs, modifies, and creates machinery or technical equipment like software programs, construction buildings, bridges, etc.

The five types of Engineers are as follows:

  • Civil Engineers.
  • Chemical Engineers.
  • Electrical Engineers.
  • Mechanical Engineers.
  • Computer Engineers.

Civil engineers deal with the construction of buildings, bridges dams, airports, etc. Chemical engineers are associated with developing the products such as medicines, petrochemicals, plastics, etc.

Electrical engineers design and develop the manufacturing of electrical equipment like navigation systems, radar, communication systems, electric motors, etc.

Mechanical engineers always maintain their focus on manufacturing power-producing and power-using machines like electric generators, gas turbines, refrigerators, air-conditioners, etc.

Computer engineers deal with designing, manufacturing, and examining all software operated within an institution's computer system.

All such types of engineers work in their respective fields for designing, and manufacturing products and their delivery which makes the life of an individual easy, efficient, and reliable.

Therefore, it is well described above.

To learn more about Engineers, refer to the link:

brainly.com/question/17169621

#SPJ1

5 0
2 years ago
Read 2 more answers
What can amber do to make sure no one else can access her document?
Lelu [443]

Answer:

Amber needs to run with the document and hide it in a safe place so no one else can access her document:)

7 0
3 years ago
Read 2 more answers
Assume the following method has been defined:
grandymaker [24]
2. 5  
Looking closely at the function mystery, you should notice that it iterates through the array of strings and counts the number of those strings that have a length greater than the value "x" passed to it. The second piece of code declares and initializes an array of strings and then calls mystery with that array and the value of 5. So it will return the count of words in the string array that have a length greater than 5.  
The strings are: 
aardvark", length = 8, will be counted. 
"banana", length = 6, will be counted. 
"cougar", length = 6, will be counted. 
"daikon", length = 6, will be counted. 
"elephant", length = 8, will be counted. 
"fog", length = 3, will NOT be counted. 
"get", length = 3, will NOT be counted.  
So there will be 5 strings counted. So the answer is "2. 5"
6 0
3 years ago
1. What year was the Entertainment Software Rating Board created?
Aloiza [94]
I think its B ir look on safari
3 0
3 years ago
Other questions:
  • Transcription in a virus that has an rna genome is complex because __________.
    11·1 answer
  • Which command on the page layout ribbon enables a user to mark where a new page will begin on the printed copy?
    6·1 answer
  • Describe the purpose of two types of OpenFlow messages (of your choosing) that are sent from a controlled device to the controll
    13·1 answer
  • What are the three parts of a Function
    12·1 answer
  • After you save a table, the new table name appears ____.
    12·2 answers
  • ​Eamon wants to provide a discount to premium buyers who order in large quantities. He wants to create a code for each price and
    11·1 answer
  • in a typical e-mail address, the "host" is A. an account designated by a user name B. CPU processor 2500 C. the receiver of an e
    12·2 answers
  • What precautions should be taken to make a computer more secure ​
    8·1 answer
  • The volumes of data collected by contemporary organizations are so huge that they are beyond the ability of typical DBMS to capt
    13·1 answer
  • What will be the output of the following code segment:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!