1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inn [45]
3 years ago
6

A flowchart that depicts the relationships among the input, processing, and output of an AIS is

Computers and Technology
1 answer:
White raven [17]3 years ago
6 0

Answer:

Option C is the correct answer for the above question.

Explanation:

A system flowchart is a picture form of all the processes of the system or software for which this flowchart is designed. It is used for the detailed design of the input, process, and output of the system. The above question asked about the type of flowchart which is used to tell the relationship between output, processing, and input of the system, which is the system flowchart which is described above. Hence the answer is option c while the other is not correct because--

  • Option 'a' states about an internal control flowchart, which is not the type of the flowchart.
  • Option b states about a document flowchart, which is used to describe the document flow.
  • Option d states about a program flowchart, which is used to describe the flow of the program.
You might be interested in
Write a program that will read the weight of a package of breakfast cereal in ounces and output the weight in metric tons as wel
almond37 [142]

Answer:

The C++ code is given below

Explanation:

#include <iostream>

using namespace std;

int main () {

int flag=1;

do{

double ounce,metric,boxes;

cout<<"Enter weight of package in ounces: ";

cin>>ounce;

metric=ounce/35273.92;

cout<<"Metric ton is "<<metric<<endl;

boxes=35273.92/ounce;

cout<<"Number of boxes are: "<<boxes<<endl;

cout<<"Press 0 to quit else press 1: ";

cin>>flag;

}while(flag==1);

return 0;

}

3 0
3 years ago
Dusk is considered “a magic hour” by photographers and is the time when light is the least harsh. True or false.
cricket20 [7]

True, it is considered the "magic hour" due to the lacking of the sun's golden rays

6 0
3 years ago
Read 2 more answers
Queries in Access can be used ______________
Alenkinab [10]
A query is an Access object used to view, analyze, or modify data. The query design determines the fields and records you see and the sort order.
6 0
3 years ago
"Currency" is a field data type ,it represents Date or time values<br> True or false tho?
trapecia [35]

Answer:

true

Explanation:

6 0
3 years ago
You must configure a certificate authority on your network to use EFS. True or False?
Westkost [7]

You do not need to configure a certificate authority on your network to use EFS.

<em>EFS</em> is the short form for<em> Encryption File System</em>. With EFS, users can encrypt their files and folders and even the entire content of a given drive. By encrypting these files and folders, the access to them are restricted and thus increasing, improving and enhancing the security level of the users' data.

In other words, even though there are other ways to restrict access (such as using <em>logon authentication</em> and <em>NTFS file permissions</em>), EFS allows to add another layer of security to data.

To <em>encrypt</em> and <em>decrypt</em> data files and folders in EFS, a <em>certificate authority (CA)</em> could be used. This is however not a requirement. In the case where there is no certificate authority, EFS  will sign a default certificate that will be used for encryption. In other words, <em>EFS will generate its own certificate</em> if none does not exist.

<em>The following are other things to note about EFS</em>

i. EFS uses a public and private key pair to encrypt data.

ii. Users do not need to enable EFS. It is enabled by default.

iii. For EFS to encrypt a file, the NTFS file system must be used.

Since a certificate authority is not required on your network to use EFS, the correct option is:

(b) False.

Read more at: brainly.com/question/10410730

6 0
3 years ago
Other questions:
  • A type of font that has a decorative tail is A.Serif font B. Sans serif font C. Bubbles font D. Reading font
    7·1 answer
  • 2. Does the government have the right to tell you what religion you should follow? Why or why not?
    9·2 answers
  • In a speech at a research conference, a computer expert stated that shopping centers would become obsolete in the future. He bel
    8·1 answer
  • Consider the markets for monitors, USB drives, central processing units, and Microsoft’s Windows. Assume monitor manufacturers u
    7·1 answer
  • Discuss the term business information SYSTEMS ​
    15·1 answer
  • Match the elements used in web searches to their functions.
    12·1 answer
  • Poob bn vbyfcfgxfc jghjg jhgh
    12·1 answer
  • An 802. 11 frame contains a number of fields. Which field describes the version of 802. 11 that is being used?
    10·1 answer
  • explain how principles of computational thinking skills are applied in finding solutions that can be interpreted into software a
    13·1 answer
  • The firewall protects a computer or network from network-based attacks along with _____________ of data packets traversing the n
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!