1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
evablogger [386]
3 years ago
14

Which of the following is NOT one of the modules of a typical Decision Support System (DSS)? Select one: a. Customer information

b. General economic and demographic information c. Employee information d. Competitor information e. Industry information
Computers and Technology
2 answers:
coldgirl [10]3 years ago
8 0

Answer:

b. General economic and demographic information

Explanation:  

What is a Decision Support System (DSS)?

Decision Support Systems (DSS) is a simulation based information system that is used to help people in decision making in organizations. A DSS system helps in gathering, analyzing and presenting information in a effective way that helps managers to take timely and effective decisions.  

What are the typical modules in a DSS?

A typical Decision Support System includes;

  • Information related to sales, inventory, and customers.
  • In order to analyze relative market share DSS needs market research data and competitor's information data.
  • It also includes employee information data also known as internal data to support decisions related to employees.
lutik1710 [3]3 years ago
5 0

Answer:

Typical Decision Support System (DSS) varies to suit the target user, ut it is created to aid decion making. It can contain all the above depending of the targetted user

Explanation:

Decision Support Systems (DSS) are  computer based information system that helps in decision making processes. DSS are interactive in nature and they are created to help decision makers use documents, communication technologies, data,  knowledge/models to accomplish decision making tasks.

The information presented by a decision support system can be graphically and may also have an  artificial intelligence (AI) system. It may be targeted to support business executives or other specific group of workers.

You might be interested in
What is 2D thinking and 3D thinking? i literally don't understand
andriy [413]

Answer:

Two dimensional thinking implies concepts that are flat or only partially representative of the whole. Three dimensional thinking implies the first part of 2d thinking conjoined with intersecting dimensions rendering a deeper field of meaning.

Explanation:

8 0
3 years ago
According to the Bureau of Labor Statistics, how
Vladimir79 [104]

Answer:

one million

Explanation:

took test

7 0
3 years ago
Common separators or delimiters used when converting a table to text include _______________________ , paragraph marks, or comma
Anon25 [30]

Answer:

tabs.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.

In Microsoft Word 2019, the users are availed with the ability to edit the word document in the following view type;

I. View Mode.

II. Print Mode.

III. Drift Layout.

To easily and quickly convert text to tables in Microsoft Word, you should insert common separators between the text columns. The common separators or delimiters used when converting a table to text include tabs, paragraph marks, or commas.

Tabs or commas are used to indicate where the texts are divided into table columns while paragraph marks indicate where a new table row begins.

6 0
3 years ago
Write a program that reads a series of strings andprints only those strings beginning with the letter "b."
coldgirl [10]

Answer:

#include <iostream>

using namespace std;

int main()

{

char str[100][20];

int n;

cout<<"Strings you want to enter"<<endl;

cin>>n;

cout<<"enter n strings"<<endl;

for(int i=0;i<n;i++)

cin>>str[i];

for(int i=0;i<n;i++)

{

if((int)str[i][0]==98) //ascii value b is 98

cout<<str[i]<<endl;

}

return 0;

}

Explanation:

The above written code is for printing the strings which starts with the letter b.

To check if the string starts with a letter b we are checking the ascii value 98 which corresponds to b and then printing those strings.

6 0
3 years ago
How do you see the recent IT evolution (e.g. platforms, big data, Internet of Things, etc.) affect Internet security and privacy
torisob [31]

Answer:

Answered below

Explanation:

With the evolution and growth of technology, and as we are increasingly having our everyday lives dependent on technology, there arise problems that shouldn't be ignored.

Security of people's personal data and information is of paramount importance. Access to personal information and the sale of these information to companies without the owner's permission is a breach of privacy and one of the challenges we face today.

With the growth of data, there are newer threats and attacks on software security systems to steal these data and therefore there's a need for everyday assessment and improvement in security of data.

3 0
2 years ago
Other questions:
  • Plz answer and dont put a random thing for the points
    11·1 answer
  • The basic input/output system (bios locates the boot loader program on a linux system by reading the __________ on the hard driv
    13·1 answer
  • Someone please help fast! I’m taking the test rn and I don’t understand this!!!!!!
    15·1 answer
  • When you send an email to your professor, a server holds that email until the professor requests it.
    8·1 answer
  • With a presentation open, you can hover your mouse pointer over a design theme on the Design tab, and PowerPoint will display th
    14·1 answer
  • What are the physical aspect of a presentation​
    7·1 answer
  • Which programming paradigm does the programming language JavaScript follow?
    14·1 answer
  • 4. In computers, an integer can be represented by more than 8-bit, what is the largest positive integer that
    9·1 answer
  • NAT addresses concerns over the dwindling IPv4 address space by ___________________. 1 point allowing networks to use fewer IP a
    15·1 answer
  • to protect a windows 10 system, you've configured system restore to automatically protect your system using restore points. will
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!