1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLga [1]
3 years ago
5

What are the most common MIS (management information systems) used in a business place.

Computers and Technology
1 answer:
Kryger [21]3 years ago
3 0

Answer:

  MIS (management information systems) is a computer system consist of hardware and a software that together serves as the backbone of operations for an organisation. It is an important tool for any business irrespective of its scale of operation and its size and frequency and usage may be vary with business. As, MIS tools help in move data and manage the information.

The technologies and tools are used in MIS have evolved over the time such as minicomputers, mainframe and server networks.

You might be interested in
Outsourcing is an alternative systems building approach that may involve subscribing to an application service provider or hirin
Sati [7]

Answer:

True

Explanation:

Outsourcing, in a general term, means getting help from an external source. In software development context, outsourcing is an alternative systems building approach that may involve subscribing to an application service provider or hiring an external vendor to design and create software. In outsourcing, a business employs the service of a third-party application developer to design and create a software.

Some reasons why companies outsource a service are;

i. Shortage or lack of experienced developer in-house.

ii. To save time. Outsourcing can help reduce time taken to develop a software application because companies tend to outsource a developer that has designed similar application(s) in the past.

iii. To reduce cost. Outsourcing can help save cost considerably.

3 0
3 years ago
"A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to
Alexeev081 [22]

Answer: A central wireless access point (AP)

Explanation:

A central wireless access point (WAP) is a hardware device which can be configured on a local area network connecting WLAN to the wired network.

These APs have built in routers which enables wireless devices to connect with it. Mostly they are hardwired to devices such as in network switches or modems.

These access points are found in many institutions, organisations, enterprises which enables devices to be connected to them and provides access to the internet and resources.

There are also public access points which enables people travelling by public transport to connect through them and in many business organisation there are closed APs for use only by the employees of them which enables file sharing and information processing.

7 0
2 years ago
.Choose the extention of Scratch Project<br><br><br> .sb2<br><br> jpeg<br><br> .exls
Ratling [72]

Answer:

I know about .sb3, and it similar to .sb2

that might be your answer.

Explanation:

jpeg is for pictures and .exls is Microsoft's excel

extension.

4 0
3 years ago
Read 2 more answers
Who likes sandshrew ​
zvonat [6]

Answer:

sandshrew is a cute character in pokemon

6 0
3 years ago
For the best night photographs, you’ll need to have a camera with a shutter speed of about 3 to 30 seconds
Alex_Xolod [135]
What are you trying to ask?

8 0
3 years ago
Other questions:
  • Suppose your company has decided that it needs to make certain busy servers faster. Processes in the workload spend 60% of their
    5·1 answer
  • You are in charge of designing a menu tree for navigating 1,250 books in a digital library. Present an argument of whether the m
    12·1 answer
  • Which type of malware can hijack internal windows components and often goes undetected because it is already loaded when the ant
    14·1 answer
  • Steps to log out of an email account ​
    5·2 answers
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    7·1 answer
  • What is the traditional cognitive perspective ofHCL?
    12·1 answer
  • If you were required to give a speech identifying the risks of using computers and digital devices, which group of items would y
    7·1 answer
  • Prompts what is a row?
    7·1 answer
  • I'm getting pretty desperate plz help me, I'll give brainiest, and ill make a free question worth 100 points this is for coding
    8·2 answers
  • . A binary search has a right subtree but no left subtree. What noes contains that least element in the tree
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!