1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novay_Z [31]
3 years ago
7

Explain what is meant by information technology (IT). Explain what is meant by information systems (IS). Why is it important to

understand the differences between information technology (IT) and information systems (IS)?
Computers and Technology
1 answer:
elena-s [515]3 years ago
4 0

Answer:Information technology(IT) :- It is the use of technology in developing, maintaining, and use of computers software, and networks for the processing and distributing the data .

Information System(IS) can be defined as a system which consists of software,hardware and trained individuals brought together to help an organization to plan,control,coordinate and to make decisions.

The difference between IT and IS is that Information Technology is the part of Information system but deals with the technology within the system.

You might be interested in
Write a memo to the vice president, outlining the steps an employee might have taken to create an e-mail message and make it app
Natali [406]

Answer:

Following are the memo to the vice president:

Explanation:

In this question, the president claims, that he got a threatening e-mail from the Maui worker. HR acknowledged that all of the workers should always be dismissed, in its protection, that worker claims that he did not send the message but he does not recognize why the message implies him return address. Here is a note for the vice president, who explains how an employee could have produced an email and made it look to be from another worker's account. That stuff we want will be progressively explained as follows:

a) The manipulating and e-mail used only by spammers and attackers were called this technique. In the SMTP server, it sends messages, that you can set up to send your spammer to the email addresses. Instead of a mail confirmation, I d the forger requires the receiver to see the next employee I d email. that recipient doesn't understand who sent the message.

b) The e-mail Systems information allowing for accessible transfer is used by the intruder or forger. It  must use an attacker order to verify communication with the SMTP server command:  

telnet smpt.server.name 25    

Its name of the SMTP server is smpt.domain.name, and the port is 25.

c) when the last stage is successful as well as a link created, this order to imitate an email account only with command can be entered:

MAIL from: Email-id

It creates a problem for the worker that sends the e-mail with the same id

d) Hacker sets the email of the receiver to:  

RCPT to: boss email-id  

It sets the beneficiary as the e-mail above.  

e) By entering an order, you can create the email data:  

DATA It may also adjust the date by using command and Any date we would like to use.  

Date: (date you would like)  

We should settle on the following:  

Subject: (your topic)

f) We press Insert after the topic is written. In this body can then be e-mail forms. It produces the text.  

g) its email forged is forwarded.

3 0
3 years ago
9.2 lesson practice ​
makvit [3.9K]

Answer:

6 columns/items

Explanation:

<em>grid</em> starts off as an empty list ( [ ] ), so right now it has 0 items/columns.

After that, 3 new items ("frog", "cat", "hedgehog") have been appended to <em>grid</em>, it now has 3 items

Finally another 3 items are appended to <em>grid ("fish", "emu", "rooster"</em>), finally <em>grid</em> ends up with 6 items in total.

5 0
2 years ago
A powerpoint ________ is a set of unified design elements.
natka813 [3]
<span>Within the elements of design, the set of elements of unified designs among them is called corporate because they create unity of identities of elements forming a set of equality of profiles and identities. Corporate is associated and collective to form equal elements and create a unit in the design.</span>
7 0
3 years ago
When you insert a new slide in a presentation, where is it placed in relation to the existing slides?.
sladkih [1.3K]
Whenever you create a new slide, it appears below the selected slide.

If you have 2 slides and want one in between the two select the first slide and then select new slide.
4 0
2 years ago
Help me plssssss which rule should be followed to stay safe online
max2010maxim [7]

Answer:

B: Avoid Sharing Photos

Explanation:

If you send a photo to a person, you need to be very careful not to send something that can give your information away, this includes but it not limited to Pictures of your town, Pictures of You, Pictures of Friends, Pictures of Family, etc.

Hope I could help!!

7 0
3 years ago
Read 2 more answers
Other questions:
  • What is the pen tools use in Photoshop?
    6·2 answers
  • What command would you run from a windows command line to test a computer's network stack?
    7·1 answer
  • Public static String doSomething(String s) { final String BLANK = " "; //BLANK contains a single space String str = ""; //empty
    6·1 answer
  • What feature allows you to access previous copies of a document on OneDrive?
    15·2 answers
  • True or false a computer with a high efficiency rating should stay cooler than one with a low effiency rating
    9·1 answer
  • Write a script that checks to see if at least one argument has been given on the command line and tests whether the argument is
    5·1 answer
  • Please Help!
    13·1 answer
  • Which best explains a password attached to a document?
    6·2 answers
  • Select the correct answer.
    6·1 answer
  • While working in a group of two the members are not getting along. You bring the two members together so they can discuss this i
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!