1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonja [21]
3 years ago
6

Everyone interacts with various information systems every day: at the grocery store, at work, at school, even in our cars. Make

a list of the different information systems you interact with daily. Can you identify the technologies, people, and processes involved in making these systems work.
Computers and Technology
1 answer:
Alex73 [517]3 years ago
5 0

Answer:

- RFID tags in shopping mall.

- Browsing the internet.

- Mobile phone calls

Explanation:

Radio frequency identification tag (RFID) in a device that holds personal information of a user electromagnetically. it is used in shopping mall, installed in the shopper's phone or a card, in which all payments are done automatically.

The internet is a global network of devices. With a subscription to a internet service provider, a user can surf the internet at any time of the day.

Mobile phones are portable devices, procured by a user for on-the-go calls. This cell phones have databases with information of cell tower connections, for easy switching for flexible but quality call adaptation.

You might be interested in
To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the syst
fgiga [73]

Answer:

The answer is "Option a".

Explanation:

Privacy is a set of rules, which limiting access to the data, and integrity ensures impartiality, accuracy, and reliability is assured to ensure, which authorized persons can have secure access to the data.

The system needs no access for everyone to achieve its secrecy and integrity contained in a completely safe data system, that's why the given statement is "true".

5 0
3 years ago
A user wants to quickly share pictures between mobile devices. The devices will be in close proximity so the necessity of a thir
BlackZzzverrR [31]

Answer:

NFC(Near Field Communication).

Explanation:

When user wants to share pictures quickly between the mobile devices which are in very close proximity we can use NFC(Near Field Communication).

Near Field Communication(NFC):-It is a group of communication protocols that lets two devices most of the times these are mobile phones to establish connection and the distance between them should be less around 4 centi meter.

8 0
3 years ago
Write a loop that fills an array int values[10] with ten random numbers between 1 and 100. Write code for two nested loops that
zalisa [80]

Answer:

#include <iostream>

#include <cstdlib>

using namespace std;

int main() {

   int[] array = new int[10];

   int index = 0;

   while(index < array.size()){

           int number = (rand() % 100) + 1;

           for (int i = 0; i < 1; i++) {

               array[index] = number;

               cout<< "Position "<< index << "of the array = "<< number << endl;

               ++index;

           }

     }

}

Explanation:

The while loop in the source code loops over a set of code ten times, The for loop only loops once to add the generated random number between 1 and 100 to the array of size 10. At the end of the for loop, the index location and the item of the array is printed out on the screen. The random number is generated from the 'rand()' function of the C++ standard library.

7 0
2 years ago
While recording a voice, if the narration is large,it is better to make a :a)a linked object b)an embedded object c)none d)does
goldenfox [79]

Answer:

c)none

Explanation:

Automatic updates can be a great problem in the case of the linked object and an embedded object. Hence, "a" and "b" are not the correct options, and since there is an effect, the d. the option is also not correct, as it does affect. And hence none of these options are correct. And the correct option is c) none.

4 0
2 years ago
Random question: on a scale of 1-10 how much do you all hate Edgenuity?
Alika [10]

-100 it is horruble, I would never join the class

7 0
3 years ago
Read 2 more answers
Other questions:
  • According to which virtue do you need to secure information by limiting computer access to authorized personnel only ?
    13·2 answers
  • Frank is a writer. He needs to work for long hours and type for long periods on the computer. What injury can Frank develop?
    15·2 answers
  • How much a 1 Gigabyte in Bytes:<br> 1. 1e+9<br> 2. 1e+6<br> 3. 1000
    8·2 answers
  • What is an example of how pseudo - randomness is used to creative variation​
    5·1 answer
  • After you have created at least four slides, a scroll bar containing scroll arrows and scroll boxes will appear on the right edg
    9·1 answer
  • Which wireless communication is typically limited to six feet of distance?
    6·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    7·2 answers
  • Plz answer this....quickkkkk​
    7·2 answers
  • In disc brakes, pads are forced against the of a brake disc​
    14·1 answer
  • PLEASE ANSWER LAST DAY OF SCHOOL. Discussion Topic
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!