1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NNADVOKAT [17]
3 years ago
14

An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the req

uired output.
Computers and Technology
1 answer:
Ronch [10]3 years ago
7 0

Answer:

applications

Explanation:

In an information system, applications or software are indispensable. This is because the entire data/info processing pipeline running on daily basis have been digitized. Users are heavily rely on the applications to gain and store new data, to manage and process the data and to deliver the necessary output. The applications enable the entire data processing work become more efficient, systematic and also more secure.

You might be interested in
Getting access to web browsing software to install it on a computer or to update your existing software is called _________ .
Ivenika [448]

Answer:

Downloading and/or Burning it on to your computer

Hope this helped! if so please mark it as brainliest

Explanation:

8 0
2 years ago
Read 2 more answers
The devices and methods that enable physically challenged computer uses to control their computer and provide input are referred
Minchanka [31]

Answer:

Assistive technologies

Explanation:

Assistive technologies are adaptive devices and softwares that are designed to serve as aids to people with disabilities in improving their functional capabilities and making them carry out activities that are difficult to perform independently. Assistive technologies include devices and software programs that are designed for physically challenged people to help them improve their use of their computer. Examples include JAWS, Voiceover which are screen reader softwares designed for the visually impaired people.

8 0
3 years ago
The development team recently moved a new application into production for the accounting department. After this occurred, the Ch
Gnesinka [82]

Answer:

B

Explanation:

User Acceptance Testing (UAT) is the testing done by end users who is going to use that application. In these testing they will test  whether the application meets all the functional requirements of the end user. If it passed then only the application will move to the production. This will ensure that the application meets the user requirements before it put into the usage.

The Answer is B

5 0
3 years ago
Does inline-block means it makes the block element inline?
elena55 [62]

Answer:

The inline-block transforms the element to generate a block of box type which is laid out like an inline box. And in QuirksMode, the inline-block is being placed inline which is on the same line where the other content lies, however, it acts as a block. And the inline-block elements are quite the same as the inline element though you can have the padding as well as the margins that can be added on all the four sides. This is the only difference though, you will have to mention in the CSS code display:inline-block. They are very commonly used to make the horizontal navigation link.

Explanation:

Please check the answer section.

7 0
3 years ago
Long distances are usually measured in kilometers.<br> T or F?
timama [110]
Depending where you are in the world it is true and false
7 0
3 years ago
Other questions:
  • Troubleshooting comes before diagnosing. Answer: false
    7·1 answer
  • Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?
    12·1 answer
  • 60 POINTS!
    13·1 answer
  • Your company runs several databases on a single MySQL instance. They need to take backups of a specific database at regular inte
    12·1 answer
  • Television, radio, newspapers, magazines, the Internet, and other forms of communication are collectively referred to as thea. W
    15·1 answer
  • 50 POINTS!!!
    14·1 answer
  • "The ability to assign system policies, deploy software, and assign permissions and rights to users of network resources in a ce
    7·1 answer
  • I'm not sure how to do these. By the way, it has to be python.
    13·1 answer
  • Explain the three schemes via which the binding of instructions and data to memory addresses can be done. In each scheme, how th
    13·1 answer
  • write a program which prompts the user for a celsius temperature, convert the temperature to fahrenheit, and print out the conve
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!