1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksenya-84 [330]
3 years ago
12

What is an information​ system? A. Information databases B. Information technology C. Hardware and software components D. Comput

er software E. Components that interact to produce information
Computers and Technology
1 answer:
Tom [10]3 years ago
5 0

Answer:

Option E Components that interact to produce information

Explanation:

Information system is a system to collect, analyze and disseminate information. An information system consists of five components that work with each other to produce information:

  1. Computer hardware - physical machine that works with information
  2. Computer software - a set of computer instructions that tell computer hardware how to perform a task
  3. Telecommunications - components that connect a group of hardware as to establish a network. This usually includes WiFI technology.
  4. Databases and data warehouses - the place where the digital data are kept and retrieved.
  5. Human resources and procedures - human expertise that run the system by following some standard procedures.
You might be interested in
Many major employers routinely monitor the performance of their employees through the computers and telephones they use. Employe
STALIN [3.7K]

Answer:

Employers are allowed to check the number of keystrokes that word processors enter during the day.

Explanation:

An employer is authorized to monitor the activity of its employee when:

  • The employee authorizes it.
  • The employer owns the system to be used.
  • Surveillance is necessary for a strictly professional purpose.

By analyzing the keys pressed per day, the employer can determine the performance provided by its employees, and if they use the company's resources, for non-work purposes.

5 0
3 years ago
The ________ model allows the owner of a resource to manage who can or cannot access the item. Owners maintain this access throu
blagie [28]

Answer:

Discretionary Access Control model

Explanation:

Discretionary Access Control (DAC) gives owners of a resource full control of objects/items they have created or been given access to, this also includes sharing the objects/items with other subjects. These owners have control over their data and maintain access through ACLs. The access-control list (ACL), is a list of permissions attached to an object in a computer file system.

The Owners can decide to grant other users access to their files, change their attributes, alter them, or delete them. DACs are discretionary because the owner can transfer information access to other users.

5 0
3 years ago
Can you redact this image
spin [16.1K]

Answer:what???

Explanation:so

What

6 0
3 years ago
To locate all locations in a document with the word "employer" and replace it with "company," you should use the _____ function.
grandymaker [24]
That should be the replace function which performs word replacements in documents.
6 0
3 years ago
What type of system security malware allows for access to a computer, program, or service without authorization?
olasank [31]

Answer:

"backdoor" is the correct answer for the above question

Explanation:

  • The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.
  • It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.
  • The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.
7 0
3 years ago
Other questions:
  • The technology (software) that automatically downloads website information to your computer is called ________.'
    15·1 answer
  • Write a program with a loop that lets the user enter a series of positive integers. The user should enter −1 to signal the end o
    7·1 answer
  • Why is outfitting a workspace with video games in technology development company considered a strategic use of money
    8·2 answers
  • Write a Python program that translates a binary number of n bits to a decimal number. Your program should first ask the user the
    8·1 answer
  • How do you mark peoples answer as the brainliest answer? I have trouble doing so. Please help!
    10·2 answers
  • Has anyone on here heard from lilkoadkmillines?
    10·1 answer
  • . What is the difference between a combinational circuit and sequential circuit? Give example of each.
    8·1 answer
  • What do mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud co
    15·1 answer
  • Which of the examples is part client side code
    10·1 answer
  • Software is in -----language​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!