1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nookie1986 [14]
4 years ago
8

Describe any four rights of users of information systems.

Computers and Technology
1 answer:
riadik2000 [5.3K]4 years ago
8 0

Four Rights of users of information system are the following;

<span>·         </span>Protection from viruses, worms and other threats

<span>·         </span>User should have an effective training

<span>·         </span>The user should have a reliable system development as well as maintenance

<span>·         </span>The user should have a computing environment

You might be interested in
"Na2SO3” represents sodium sulfite.
STatiana [176]
There are four atoms
5 0
3 years ago
Read 2 more answers
How does a hard drive work
svetlana [45]
A small hard drive typically has only one platter, but each side of it has a magnetic coating. Bigger drives have a series of platters stacked on a central spindle, with a small gap in between them. The platters rotate at up to 10,000 revolutions per minute so the read-write heads can access any part of them.
7 0
4 years ago
Given the following method definitions: void mystery(double a) { System.out.print("double! "); } void mystery(int a) { System.ou
kicyunya [14]

Answer:

The correct answer to the following question is option "b".  

Explanation:

The method having the same name but the arguments have different so it is called method overloading. It is a part of the object-oriented programming language (oops).  

  • In the given code we define same method two times that is "mystery()". but in this method, we pass two different parameters. For the first time, we pass a double variable that is "a" as a parameter. In the second time, we pass an integer variable that is "a" as a parameter and in both functions, we write some codes.
  • In the calling time, we call function two times. In first time calling we pass an integer value that is "1" and second time calling we pass double value that is "1.0". So the output of this code is "int! double!".  

That's why the option "b" is correct.

6 0
3 years ago
Which statement describes a difference between front-end and back-end databases?
Westkost [7]

Answer:

So a statement could be the front-end is what we see and the back-end is what we don't see, the behind the scenes. Like a play, we see the characters and them acting out a story but we dont see who is doing the lights, playing the music, fixing the costumes and makeup etc..

Explanation:

The term front-end means interface while the term back-end means server. So imagine you go on your social media app, what you can see like your friends list and your account and the pictures you post, who liked the pictures and all of that is called the front-end and is what <em>you</em> as a user can interact with; front-end development is the programming that focuses on the visual aspect and elements of a website or app that a user will interact with its called in other words the client side. Meanwhile, back-end development focusing on the side of a website users can't see otherwise known as the server side, its what code the site uses and what it does with data and how a server runs and interacts with a user on whatever device surface they're using.

6 0
2 years ago
Read 2 more answers
What does 32mb SVGA do
Nadya [2.5K]

Answer:

hope it helps PLZ MARK ME BRAINLIEST,,!

Explanation:

They stabilize your grpahic image.

5 0
3 years ago
Other questions:
  • Marisol manages the online advertising campaigns for a chain of toy stores with both a physical and an online presence. Which Go
    7·1 answer
  • What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
    12·1 answer
  • Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact tha
    5·1 answer
  • Describe an application or a situation in which it is not convenient to use a linked list to store the data of the application
    12·1 answer
  • The construction of a mixed media assemblage would be considered
    9·1 answer
  • Connect 5 LEDs with any random colors. Iteratively, turn ON 1 to 5 LED(s) that will take 5 iterations in total, and in every ite
    6·1 answer
  • What was the first computer programming language?
    7·2 answers
  • What would a digitizing application create?
    13·2 answers
  • HELP !!! Prompt <br> What is formatting text?
    7·2 answers
  • What are two differences between a wide angle lens and a telephoto lens?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!