1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
9

Information from the system that is used to make modifications in the input, processing actions, or outputs is referred to as: G

roup of answer choices A. Reporting B. Feedback C.Acquisitions D.Processing
Computers and Technology
2 answers:
vekshin13 years ago
8 0

Answer:

D

Explanation:

The processing software helps you to run such activities on a computer device. As you key in the essay on the keyboard, it appears on the screen in front of you. After you examine the essay on the screen, make changes, and determine that it suits your desired content, you can save it using a strorage device

emmasim [6.3K]3 years ago
7 0

Answer:

B. Feedback

Explanation:

Apart from the four basic functions of the Information system - input, process, output, store - the feedback function is also very important.

Feedbacks are ideas, suggestions, impressions, critics and even criticisms that are being got from users of a system. With feedback, information can be got to be used to make modifications in the input, processing actions, or output.

Feedback will also allow to rebuild and/or revisit an existing system and even allow businesses to make tangible, logical and positive business decisions.

You might be interested in
Which of the following statements is not true? Group of answer choices
Nesterboy [21]

Answer:

A

Explanation:

Option A is not true because a Boolean variable type can hold one of two values only that is  (true/True or false/False).

All the other options given in the question are correct because

  1. A variable declaration refers to specifying its type and name
  2. If string variables are assigned a numeric values which is legal provided the values are enclosed in quaotes( " "), trying to carryout a mathematical operation like addition will result in string concatenation.
  3. The Variable name I_Love_to_eat_pizza is legal because it contains no special characters, doesn't start with a number and its not a reserved word in any language
4 0
3 years ago
What was the strategy the company adopted for ERP implementation?
SashulF [63]

Answer:

Big Bang or Phased Approach – ERP Implementation strategies include Big Bang, Phased, Hybrid, and Parallel Adoption. Each organization requirements are different and as such, the project management method is itself evolving using PPM, SCRUM, and DevOps.

8 0
2 years ago
A device which lets you interact with the computer
Gnoma [55]

Answer:

Input, output, storage.

Explanation:

Input is used to interact with, or send data to the computer (mouse, keyboards, etc.). Output provides output to the user from the computer (monitors, printers, etc.). And storage which stores data processed by the computer (hard drives, flash drives, etc.).

3 0
2 years ago
Read 2 more answers
The HTML tag for the smallest heading is​ what​
Gre4nikov [31]

Answer:

The HTML <h1> to <h6> tag is used to define headings in an HTML document. <h1> defines largest heading and <h6> defines smallest heading.

Explanation:

5 0
2 years ago
Refer to the exhibit. A network administrator configures a named ACL on the router. Why is there no output displayed when the sh
nignag [31]

Answer:

The correct answer to the following question is ACL name is the case sensitive.

Explanation:

ACL name is unique, alphanumeric and case sensitive that's why the router deals like the access_network, the ACCESS_NETWORK as it if they are the two separates ACL's.

That's why ACL always has the unique identities.

7 0
3 years ago
Other questions:
  • Which type of password would be considered secure?
    15·1 answer
  • Write a Python program to do the following: (a)Use a for loop and a random integer generator to generate 5 random integers in 1
    10·1 answer
  • Charli's password was changed a couple of weeks ago because someone figured it out. Can someone go to a password generator and f
    5·2 answers
  • The term integration mean?
    7·2 answers
  • What is the correct order of the phases of the software development process?
    14·1 answer
  • Draw AND, OR, XOR and XNOR gates with truth table and logic gates.<br><br>.​
    11·1 answer
  • What does this function do in the code?
    5·2 answers
  • Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goa
    10·2 answers
  • Which code will print a random number between 1 and 100?
    15·2 answers
  • Create a program which reads in CSV data of Creatures and loads them into aHash Map. The key of this hash map will be the name o
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!