1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GarryVolchara [31]
3 years ago
5

A group of interrelated resources acting together according to a plan to accomplish the goals of the records and information man

agement program is called__________.
Computers and Technology
1 answer:
Verizon [17]3 years ago
8 0

Answer: Record system

Explanation:

 The record system is one of the type of information storage system that stored all the records or data in the form of management system.

  • We can also retrieve the our data or information by saving it in the system so that we can use that specific data for future use.
  • It also helps in ensuring the data integrity and providing an efficient security to our data or information in the system.

 According to the given question, record system is one of the information management system that helps in accomplished the goals in the form of record.

 Therefore, Record system is the correct answer.

You might be interested in
TRUE OR FALSE: THE BUILDER'S CLUB IS A PAID SUBSCRIPTION.
nadya68 [22]

Answer:

true

Explanation:

3 0
3 years ago
Read 2 more answers
David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in h
earnstyle [38]

Answer:

1 - Monitoring the data coming in and out of the companies network and limiting the amount of sensitive information or completely blocking it with a rattrap firewall or any other network monitoring device.

2 - Creating a windows system image (if it were to be a windows device) and saving it in a closed location with a disk only capable of writing without reading.

Explanation:

7 0
3 years ago
What plan can businesses use to protect sensitive data from malicious attacks?
Anna11 [10]

Answer:

cybersecurity

Explanation:

it's either that or anti-spywhare but cybersecurity seems more likely

6 0
3 years ago
Read 2 more answers
X2/3-2x1/3-35=0
Ganezh [65]

Answer:

x2/3-2x1/3-35=0

Two solutions were found :

x =(2-√424)/2=1-√ 106 = -9.296

x =(2+√424)/2=1+√ 106 = 11.2

Explanation:

7 0
3 years ago
. In the BorderLayout class, what are NORTH, SOUTH, EAST, WEST, and CENTER?
ycow [4]

Answer:

A BorderLayout corresponds to a layout type where the components are organized along geographical directions represented by NORTH, SOUTH, EAST, WEST, and CENTER.

Explanation:

The layout class is awt determines the actual placement of components in the user interface. BorderLayout is a layout where the components are organized along geographical directions represented by NORTH, SOUTH, EAST, WEST, and CENTER. For example:

Panel p = new Panel();

p.setLayout(new BorderLayout());

p.add(new TextArea(), BorderLayout.CENTER);

p.add(new Button("Close"), BorderLayout.SOUTH);

This code segment will add a textarea at the CENTER of the interface and a button 'Close' towards the SOUTH.

8 0
3 years ago
Other questions:
  • What is the lowest and highest address of a 2^20 byte memory, if it is byte readable.
    11·1 answer
  • When transporting data from real-time applications, such as streaming audio and video, which field in the ipv6 header can be use
    12·1 answer
  • Explain the history of computing of mechanical era
    14·2 answers
  • Most smartphones use operating systems developed by ________. Select one: A. Symbian and Apple B. Apple and Microsoft C. Microso
    13·1 answer
  • Which of the following represents the biggest difference between asymmetric and symmetric cryptography?
    9·1 answer
  • . Select the advantages of RAID-5 relative to other RAID schemes. (MAY SELECT MULTIPLE)
    7·1 answer
  • To change the name of a field, press and hold or right-click the column heading for the field, tap or click ____ on the shortcut
    7·1 answer
  • I need help picture above
    15·2 answers
  • Which of the following statements is true of San serif fonts?
    12·2 answers
  • Mack signs into his laptop and gets a message saying all his files have been encrypted and will only be released if he sends mon
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!