1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KiRa [710]
3 years ago
7

Which command displays the status of the ipsec installation?

Computers and Technology
1 answer:
Alexandra [31]3 years ago
8 0
Character command shows the status.
You might be interested in
Website managers use____ every day.
babymother [125]

Answer:

technology

Explanation:

4 0
3 years ago
Read 2 more answers
Word documents contain how many sections by default?
Butoxors [25]

Answer:

Word documents contain one section by default

Explanation:

8 0
3 years ago
What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible
meriva

Answer:

Move the duplicated code outside of the if statement

5 0
3 years ago
Rachelle is writing a program that needs to calculate the cube root of a number. She is not sure how to write the code for that
Dmitriy789 [7]

The cube root is a number multiplied by itself three times to get another number

The code to use is y = x**(1/3)

<h3>How to determine the code to use</h3>

Assume the variable is x, and the cube root of x is y.

So, we have the following equation

y = x^\frac13

In Python, the code to use is y = x**(1/3)

Hence, the code that Rachelle can use in her calculation is x**(1/3)

Read more about cube roots at:

brainly.com/question/365670

3 0
2 years ago
Read 2 more answers
in a management information system, the quality of information is determined by its usefulness to users, and its usefulness dete
Gekata [30.6K]

Answer:

It is true, that in a management information system, the quality of information is determined by its usefulness to users, and its usefulness determines the success of the information system.

Explanation:

A management information system (MIS) is a computerized and centralized database that collects data from many different resources in the organization. And, then processes and organized the data in a way that would be useful and helpful in making a business decision. These days, for both large and small organization, collection of data and use of technology are so prevalent and these organization collecting the data from their businesses resources daily even hourly such as daily sale, daily expense, hourly wages, etc, and then managing it in a way to make a right business decision. A good MIS in an organization gives a competitive advantage because it turns the data into usable and into helpful information that can be used in making business decisions and strategy and to increase profit.

However, the information quality is based on its usefulness to the user or to the organization. Because if the MIS produces the information that is not useful to the user, the information and use of MIS are useless in the organization because the information that is required in making a business decision is not useful.

If the MIS produces the quality information to its user in making the right business decision and organization or user take the right decision that brings profit to the organization.  Then, this use of information determines the success of an information system in an organization.

For example:

In a Bakery, the MIS produce the right information in making decision e.g. MIS produce information to bakery owner that on valentine day, most people buy chocolate. Then, the owner tries to meet the demand for chocolate on valentine's day. Therefore, this is the quality of information and it is determined by its usefulness to the bakery owner and its usefulness determines the success of MIS.

4 0
4 years ago
Other questions:
  • Once the technology for the collection of solar power is in place what will be two benefits of its use
    9·1 answer
  • Why is fragmentation of an ip packet sometimes required?
    12·1 answer
  • If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appr
    14·1 answer
  • Which finger presses the Shift key on the keyboard?
    6·2 answers
  • What is the largest value that can be represented by 6 binary digits? .
    5·1 answer
  • What is a simulation?
    5·2 answers
  • Brain for free 12628397
    14·2 answers
  • Frrrrrrrrrrreeeeeeeeee brainliest for u
    13·2 answers
  • When must an Assured Equipment Grounding Conductor Program (AEGCP) be in place?
    13·1 answer
  • 1. The letters that appear after the dot after a file name are called the:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!