1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shkiper50 [21]
3 years ago
7

_____ of a global information system (GIS) concentrates on medium-range activities that move an organization toward achieving lo

ng-term goals.
a. Tactical support
b. Operational support
c. Differential support
d. Strategic support
Computers and Technology
1 answer:
Dafna11 [192]3 years ago
8 0

Answer: (A) Tactical support

Explanation:

 GIS is the global information system in which the data is delivered worldwide in the form of information system. The global information system achieve long term goals in an organization.

  • The tactical support is used in the global information system for concentrating the activities on the medium range in an organization.  
  • The tactical support is one of the effective way to producing the desirable result and also achieve the main strategic objective.

Therefore, Option (A) is correct.

You might be interested in
Oxnard Casualty wants to ensure that their e-mail server has 99.98 percent reliability. They will use several independent server
sattari [20]

Answer:

The smallest number of servers required is 3 servers

<em />

Explanation:

Given

Reliability = 99.98\%

Individual Servers = 95\%

Required

Minimum number of servers needed

Let p represent the probability that a server is reliable and the probability that it wont be reliable be represented with q

Such that

p = 95\%\\

It should be noted that probabilities always add up to 1;

So,

p + q = 1'

Subtract p from both sides

p - p + q = 1 - p

q = 1 - p

Substitute p = 95\%\\

q = 1 - 95\%

Convert % to fraction

q = 1 - \frac{95}{100}

Convert fraction to decimal

q = 1 - 0.95

q = 0.05

------------------------------------------------------------------------------------------------

<em>To get an expression for one server</em>

The probabilities of 1 servers having 99.98% reliability is as follows;

p = 99.98\%

Recall that probabilities always add up to 1;

So,

p + q = 1

Subtract q from both sides

p + q - q = 1 - q

p = 1 - q

So,

p = 1 - q = 99.98\%

1 - q = 99.98\%

Let the number of servers be represented with n

The above expression becomes

1 - q^n = 99.98\%

Convert percent to fraction

1 - q^n = \frac{9998}{10000}

Convert fraction to decimal

1 - q^n = 0.9998

Add q^n to both sides

1 - q^n + q^n= 0.9998 + q^n

1 = 0.9998 + q^n

Subtract 0.9998 from both sides

1 - 0.9998 = 0.9998 - 0.9998 + q^n

1 - 0.9998 = q^n

0.0002 = q^n

Recall that q = 0.05

So, the expression becomes

0.0002 = 0.05^n

Take Log of both sides

Log(0.0002) = Log(0.05^n)

From laws of logarithm Loga^b = bLoga

So,

Log(0.0002) = Log(0.05^n) becomes

Log(0.0002) = nLog(0.05)

Divide both sides by Log0.05

\frac{Log(0.0002)}{Log(0.05)} = \frac{nLog(0.05)}{Log(0.05)}

\frac{Log(0.0002)}{Log(0.05)} = n

n = \frac{Log(0.0002)}{Log(0.05)}

n = \frac{-3.69897000434}{-1.30102999566}

n = 2.84310893421

n = 3 (Approximated)

<em>Hence, the smallest number of servers required is 3 servers</em>

6 0
3 years ago
Alice sends a message to Bob in a manner such that Bob is the only person who can tell what the real message is. Which security
cupoosta [38]

Answer:

confidentiality

Explanation:

Alice sends a message to Bob in a manner such that Bob is the only person who can tell what the real message is. Which security concept is this an example of

3 0
3 years ago
IPv4 addresses have 4 groups of four alphanumeric characters, which allow for 2^32 or roughly 4.3 billion unique IP addresses. S
Stolb23 [73]

Answer

I believe its true

8 0
4 years ago
Which design principle indicates that a project is visually satisfying
joja [24]

Answer: harmony

Explanation:

Took the test on gmetrix ;)

6 0
3 years ago
The Advanced Encryption Standard (AES) symmetric cipher uses how many rounds of substitution and re-arranging when utilizing a 2
andrew-mc [135]

Answer:

The answer is "13 rounds"

Explanation:

It is a code, family known as encryption methods of the unit. It is a block template, which uses a per-block encryption algorithm, and it usually measured in a bit for every block.  It was accepted by the NIST at the end of 2000 as a replacement for DES.  

  • In this encryption process, it implemented on 3 different steps on each of the clear text keys.
  • In step 2 a variety of cycles based on the key type are preformed, and in  9 rounds are done on a 128-bit key, 11 rounds are done on a 192-bit key and 13 rounds on a 256-bit key called the AES-256 key.

7 0
3 years ago
Other questions:
  • Which of the following best describes a toolbar?
    9·1 answer
  • An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
    14·1 answer
  • Need answer Quick!!!!!
    10·1 answer
  • A _____ is a basic element that refers to the continuous movement of a point along a surface, such as by a pencil or brush a typ
    9·1 answer
  • File compression is only available on hard-disk drives. <br><br><br> a. True <br><br><br> b. False
    6·1 answer
  • Assume that processor refers to an object that provides a void method named process that takes no arguments. As it happens, the
    7·1 answer
  • I have this project and I can't do anything about it, I do really need help ASAP
    5·1 answer
  • Source Code for TF2 - Please insert it here
    14·1 answer
  • A __________ is a sequence of characters.
    10·1 answer
  • What are the 3 attributes of information?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!