1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kay [80]
4 years ago
11

________ systems help supervisors by generating databases that act as the foundation for other information systems. Group of ans

wer choices
1. Decision support
2. Management information
3. Transaction processing
4. Executive support
Computers and Technology
1 answer:
Dahasolnce [82]4 years ago
6 0

Answer:

1. Decision support systems

Explanation:

DSS (Decision Support Systems) are systems that provide supports for decisions, judgments and analysis in an organization. They help in solving problems and in decision-making. With DSS, databases that act as foundation for other information systems can be generated for supervisors helping them to make logical analysis of a particular problem hence solving it.

DSS will actually not give the decision, but will guide the decision maker in making the decision by helping to gather raw facts and useful models which enhance decision making.

You might be interested in
Which window shows instructions for a lab activity?
Svetach [21]

The window that shows instructions for a lab activity is known as the Cisco Packet Tracer Activity window.

<h3>What is Packet Tracer activity?</h3>

Cisco Packet Tracer is known to be a form of a comprehensive networking technology that is made for lecture and it is also a learning tool that gives a kind of a special combination that are made up of realistic simulation and visualization experiences as well as assessment, activity authoring capabilities, and others.

Hence, The window that shows instructions for a lab activity is known as the Cisco Packet Tracer Activity window.

Learn more about computer windows from

brainly.com/question/25243683

#SPJ1

4 0
2 years ago
GIVING BRAINLIEST What does output allow a computer to do? Display information Receive information Do complex math problems Do m
kumpel [21]
The answer is display information
4 0
3 years ago
Read 2 more answers
The memory units that follow are specified by the number of words times the number of bits per word. how many address lines and
statuscvo [17]
A) - 2G = 2 * 2^30 = 2^31 words therefore you need 31 bits to specify a memory location( 31 address line). 
<span>- If your word has 32 bits then you need 32 data lines. </span>
<span>- The # of bytes is (2 * 2^30 * 2^5 )/ 8 = (2^36) / 8 = 2^36 / 2^3 = 2^33 bytes </span>
8 0
3 years ago
Refer to the method f:
Goshia [24]
<h2>This function will land up in infinite function call</h2>

Explanation:

first time when the function gets invoked,

f(6,8), so k=6 & n=8, inside the function it checks k==n, ie. 6==8, returns false, then one more if is available, so 6>8 is check for , once again it is false and else loop is executed, the function is called recursively using f(k-n,n), that is f(6-8,8), it means f(-2,8) is passed.

Second time,

if(-2==8) is false, so if(-2>8) is again false and function f(-10, 8) is called

if(-10==8) is false, so if(-10>8) is again false and function f(-18,8) is called

if(-18==8) is false, so if(-18>8) is again false and function f(-26,8) is called

So this goes recursively and ends in an infinite function call.

5 0
4 years ago
Namedroppers is a tool that can be used to capture Web server information and vulnerabilities in a Web site's pages that could a
Alexxx [7]

Answer:

False

Explanation:

Namedroppers help you look for domain names that are constantly updated on a daily basis. You can purchase a domain name of your choice from the results of the available domain names that are populated by namedropper. The description from the question above belongs to web application vulnerability scanners. These scanners are automated to scan web apps and look for vulnerabilities that most attackers take advantage of like SQL injection and buffer overflows.

8 0
4 years ago
Other questions:
  • Explain Organizational approach to System Analysis and Design
    11·1 answer
  • "explain why professional software is not just the programs that are developed for a customer"
    7·1 answer
  • A date consists of a month, day, and year. Consider the class Date of such dates. Suppose that Date represents the month, day, a
    14·1 answer
  • When a CPU executes each instruction in a program, it uses a process known as the __________.
    15·1 answer
  • How is digital footprint created ?
    15·1 answer
  • Catastrophic injuries and illnesses account for two-thirds of total health care costs in the country of Gnut. The Gnuti governme
    15·1 answer
  • What is the output of the first and second print statements?
    13·1 answer
  • Resize vector countDown to have newSize elements. Populate the vector with integers {newSize, newSize - 1, ..., 1}. Ex: If newSi
    6·1 answer
  • Time management is the ability to use time effectively.
    13·2 answers
  • Big data are _____. Select 2 options. (please help!)
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!