1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
13

The process used to obtain the information system resources needed to provide the services necessary to meet a specific set of _

______, no matter how broad or narrow, is known as system acquisition.
Computers and Technology
1 answer:
Olenka [21]3 years ago
4 0

System Acquisiton: The process used to get the information system resources needed to provide services that are necessary to meet a specific set of needs.

- 2 fundamental strategies for system acquisition:

1) buy off-the-shelf software

2) build a custom application.

You might be interested in
]
loris [4]
B. Which promotes a chemical reaction
5 0
3 years ago
An I/O-bound process ___________________________________________________ Select one: a. does not need CPU time b. spends less of
DiKsa [7]

Answer:

Spends more of its time seeking I/O operations than doing computational work.

Explanation:

The I/O bound process are depend on Input and output speed. on the other hand computational work is associated with CPU bound processes. Therefore option "C" is better option for I/O bound processes.

8 0
4 years ago
The Quake, One of the first fully 3D games was released in the year? 1986 1996 1995​
kipiarov [429]
It was released in 1996
5 0
3 years ago
Match the components of a blog to their descriptions.
motikmotik

Answer:

Explanation:

1. entry title - name of the posting

2. permalink - place where a blog posting is located

3. entry date - when the posting became available

4. comment - allows users to add to the conversation

3 0
3 years ago
Which of the following is preventing the remote user from being able to access the workstation?
larisa86 [58]

Answer:

Option C is the correct option to the following question.

Explanation:

In the following statement, the absence of the network time simultaneous occurrence is generated by the authentication mismatches then, the remote user is preventing access to the workstations. So that's why the network time is absent that caused the prevention in the remote user by accessing the workstations.

5 0
4 years ago
Other questions:
  • What can be designed to create annoying glitches or destoey data?...
    13·2 answers
  • Which of the following assumes that the repair will happen just as the technician stated?
    9·1 answer
  • Add three methods to the Student class that compare twoStudent objects. One method should test for equality. A second method sho
    13·1 answer
  • An _____image is an image that appears on a web page
    8·1 answer
  • Which of the following are not deducted on a typical pay stub
    12·1 answer
  • How to do a linear equations
    8·1 answer
  • How does video conferencing change the way we work today?
    6·1 answer
  • On what aspect of digital media do people often focus on at the expense of the important supporting roles?
    8·1 answer
  • Describe the difference between information poor and information rich society?​
    9·1 answer
  • Given the tables PRODUCT (ProductID. Description. Cost) SUPPLIER (Supplier D. ContactName, Phone Number) as shown in the figure
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!