1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
puteri [66]
3 years ago
13

In an airline reservation system, on entering the flight number, the flight schedule and the flight status are displayed. In thi

s scenario, the _____ decision-making analysis has been used to display the desired results on the system.
a. if-else
b. what-is
c. if-continue
d. what-if
Computers and Technology
2 answers:
Cerrena [4.2K]3 years ago
7 0

Answer:

b. what-is

Explanation:

In an airline reservation system, on entering the flight number, the flight schedule and the flight status are displayed. In this scenario, the what-is decision-making analysis has been used to display the desired results on the system.

Svet_ta [14]3 years ago
5 0

Answer:

b. what-is

Explanation:

According to my research on the decision making analysis, I can say that based on the information provided within the question this analysis is called "what-is". This (like described in the question) is the act of providing a specific piece of information in order to receive a set of information in regards to what you provided.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes
Mamont248 [21]

Answer:

false negative

Explanation:

A false negative is a dangerous state in which the IDS (Intrusion Detection System) assumes the activity as acceptable in which the activity is actually an attack occurred on the system.

That means, the Intrusion Detection System has failed to catch the attack. This is the most dangerous state, as the systems were compromised and the network or cyber security people were unable to find the attack.

More generally, there are two types of Intrusion Detection Systems ( IDS ). Network based IDSs ( NIDS ) and Host based IDSs ( HIDS ).

5 0
4 years ago
What is an Integrated Development Environment (IDE)?
kogti [31]

Answer: A diverse workplace for software developers

6 0
3 years ago
Thirty percent of a magazine's subscribers are female. A random sample of 50 subscribers Answer the following questions using Ex
Ann [662]

Based on the mean of the subscribers, the sample size, and the standard deviation, the probability of females being at most 0.25 is 0.2202.

The probability that they are between 0.22 and 0.28 is 0.2703.

The probability that they are within 0.03 of the population proportion is 0.3566.

<h3>What is the probability that they are at most 0.25?</h3>

Using Excel, we shall assume that the distribution is normally distributed.

We can therefore use the NORM.DIST function:


=NORM.DIST(0.25,0.3,0.0648,TRUE)

= 0.2202

<h3 /><h3>What is the probability that they are between 0.22 and 0.28?</h3>

=NORM.DIST(0.28,0.3,0.0648,TRUE) - NORM.DIST(0.22,0.3,0.0648,TRUE)

= 0.2703

<h3>What is the probability that they are within 0.03 of the population proportion?</h3>

X high = 0.30 + 0.03

= 0.33

X low = 0.30 - 0.03

= 0.27

= NORM.DIST(0.33,0.3,0.0648,TRUE) - NORM.DIST(0.27,0.3,0.0648,TRUE)

= 0.3566.

Find out more on probability at brainly.com/question/1846009.

8 0
2 years ago
Give two examples of desktop publishing software
soldier1979 [14.2K]
There are quite a lot of desktop publishing software as of today.
I'll give you the names of some of it.
- Adobe inDesign - one of the most popular
- Corel Draw
- Microsoft Publisher
- Serif
- Ultra Xml
And more.
There are actually a lot if you are just about to check in the internet.
7 0
4 years ago
The determination of the overall system architecture consisting of a set of physical processing components, hardware, software,
Masteriza [31]

Answer:

Systems engineering is the process of planning, designing, and implementing a system or systems.

7 0
2 years ago
Other questions:
  • How do i fix my this??
    12·2 answers
  • A persons decision to take action without being asked is
    9·1 answer
  • C++
    8·1 answer
  • With iteration-control systems, each team member ________. is given an account with a set of permissions is given their own priv
    6·1 answer
  • An IT company revises its process parameters in response to complaints from vendors that products were not ready on time. This w
    15·1 answer
  • Which of the following skills do employers in any field expect their employees<br> to have?
    5·1 answer
  • Easy Bib and Cite This For Me are examples of online
    12·1 answer
  • For what kind of work would you use a block plane?
    10·1 answer
  • Compare and contrast the uses of NetWitness Investigator and Wireshark used in the lab. Why would a network administrator use Wi
    8·1 answer
  • What are the features of boot sector virus​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!