1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Strike441 [17]
3 years ago
13

An operations information system typically accesses data gathered by a _____ system and converts the data into useful informatio

n.
Computers and Technology
1 answer:
Darina [25.2K]3 years ago
6 0
Answer: Operating System 
You might be interested in
The process of bringing data or a file from one program to another is called
Digiron [165]
The answer is importing
8 0
3 years ago
Read 2 more answers
Given the statement: int list[25]; The index can go from 0 to 25 inclusive withoutgoing beyond the end of the array.true or fals
k0ka [10]

Answer:

False.

Explanation:

When we create an array of size n, then it's index will starts from 0 to n-1. Array index starts with 0 because the first element of the array holds the memory location that refers to 0 element away.Similarly 2nd element of array is 1 distance away from that location. That is why index starts with 0 and goes to n-1 if the size  is n.

In the question question, int list[25] is given. So the index will be from 0

to 25-1 only.If index will goes to 25 then it will go beyond the array.

3 0
4 years ago
Machine language library routines are installed on computers Select one: a. because they can come as part of the operating syste
Licemer1 [7]

Answer:

c. all of these choices

Explanation:

all of them are correct. i took a quiz on this like 2 days ago and that was the answer.

<em>hope this helpsssssssss!!!!!!!!!!! :):):)</em>

6 0
4 years ago
You have just performed a cpm analysis and have found that more than one path through the project network has zero slack values.
Alex787 [66]

Answer:

There are multiple critical paths

Explanation:

The critical path method (CPM), or critical path analysis (CPA), is an algorithm for scheduling a set of project activities. It is commonly used in conjunction with the program evaluation and review technique (PERT). A critical path is determined by identifying the longest stretch of dependent activities and measuring the time required to complete them from start to finish.

The essential technique for using CPM is to construct a model of the project that includes the following:

  •    A list of all activities required to complete the project (typically categorized within a work breakdown structure),
  •    The time (duration) that each activity will take to complete,
  •    The dependencies between the activities and,
  •    Logical end points such as milestones or deliverable items.      

Using these values, CPM calculates the longest path of planned activities to logical end points or to the end of the project, and the earliest and latest that each activity can start and finish without making the project longer. This process determines which activities are "critical" (i.e., on the longest path) and which have "total float" (i.e., can be delayed without making the project longer).

considering the above function of the cpm analysis because you have multiple path, there is tendency that more than path through the project network will have zero slack values.

5 0
3 years ago
Given the following code, what will be the value of finalAmount when it is displayed? public class Order { private int orderNum;
kkurt [141]

Answer:

522

Explanation:

5 0
3 years ago
Other questions:
  • Write a script named numberlines.py. This script creates a program listing from a source program. This script should: Prompt the
    7·1 answer
  • Explain the history of computing of mechanical era
    14·2 answers
  • What does %d, , %c, %s mean and what's their difference?
    12·1 answer
  • Review the two e-mail messages below for their adherence to the guidelines for professional e-mail correspondence you have learn
    6·1 answer
  • A browser is used for creating Web pages. true or false?
    5·2 answers
  • What will you see on the next line after the following lines of code?
    12·1 answer
  • Match the desired outcome to the appropriate action.
    6·1 answer
  • What's the maximum number of ad extensions that can show for a particular query or device at any given time?
    13·1 answer
  • Which of the following is the best description of an ip address?
    8·1 answer
  • This computer is used by touching your finger.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!