1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DiKsa [7]
3 years ago
8

Which of the following statements is TRUE of the information systems (IS) department? A. The operations group monitors user expe

rience and responds to user problems. B. Data administration is performed exclusively by the outsourcing relations group. C. Programs used in all information systems are developed in-house by the maintenance group. D. If the IS primarily support accounting and finance activities, the chief financial officer (CFO) is appointed as the chief information officer (CIO). E. Data backup is performed primarily by the marketing group.
Computers and Technology
1 answer:
Ainat [17]3 years ago
7 0

Answer:

Option A is correct

Explanation:

The operations group monitors user experience and responds to user problems.

Other importance or roles of information system department are included below;

They information system department also support the main aspect of organization running for example, in data analysis and so on.

The information system department also help in developing decision making.

The information department involves system analyst, data base administrator , programmer, computer engineer, ICO and so on

You might be interested in
Which of the following defines guidelines that specify the way computers access the medium to which they are attached, the type(
Tatiana [17]

Answer:

(D) Network Standard.

Explanation:

Networking standards ensures the ability of networking technologies by defining the guidelines of communication that specify way computer access the medium they are attached.Network standards also defines which type of transmission transmission to use wireless or wired,which media to use etc.

5 0
3 years ago
Find the equation of a line which has 10 points the following two coordinates: (4, 0) and (3, 4)​
alex41 [277]

Answer:

The equation of the line is y = -4·x + 16

10 points on the line include;

(0, 16), (1, 12), (2, 8), (3, 4), (4, 0), (5, -4), (6, -8), (7, 12), (8, -16), (9, -20), and (10, -24)

Explanation:

The given points through which the line passes are;

(4, 0) and (3, 4)

The slope, 'm', of the line is given as follows;

Slope, \, m =\dfrac{y_{2}-y_{1}}{x_{2}-x_{1}}

Therefore, the slope of the line is (4 - 0)/(3 - 4) = -4

In point and slope form we can get;

\dfrac{y-0}{x-4} = -4

The equation of the line in point and slope form is therefore;

y = -4·(x - 4) = -4·x + 16

The equation of the line in slope and intercept form is

y = -4·x + 16

10 points on the line are obtained using the equation of the line and the desired x-values input into cells on MS Excel and presented here as follows;

(0, 16), (1, 12), (2, 8), (3, 4), (4, 0), (5, -4), (6, -8), (7, 12), (8, -16), (9, -20), and (10, -24)

8 0
2 years ago
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
wariber [46]

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

5 0
3 years ago
Ok so another weird question! So if you know what google drive is and how to upload a video why does it keep adding hours! it ke
lesya [120]

Answer:Your video may be too long and you may not have that much storage left.

Explanation:

5 0
3 years ago
Now suppose that the file is broken into 5 packets, each of 10 Mbits. Ignore headers that may be added to these packets. Also ig
Vesnalui [34]

Answer:

6.025seconds

Explanation:

For each link we have,

Dtran = 10mbits/10mbps =1 second

Dprop = 5000km/2×10^8m/sec =0.025sec.

Total delay =( 5 + 2-1) + Dtran+ 2 Dprop= 6.025seconds

4 0
3 years ago
Other questions:
  • Social networking sites like Office Online, PayPal, and Dropbox are used to develop social and business contacts.
    6·2 answers
  • In a student​ database, a row that describes the top​ student, including his or her​ lastname, firstname, and​ studentnumber, is
    9·1 answer
  • Which of the following statements is NOT true about a mainframe computer?
    14·1 answer
  • A database interrogation is a major benefit of the database management approach, where end users can query (“ask”) the database
    6·1 answer
  • High capacity circuits are limited by the least capable network link, which is typically the user connection. As such, it is imp
    11·1 answer
  • A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however
    5·1 answer
  • What is an compiler?
    15·2 answers
  • True / False
    6·1 answer
  • Briefly explain specialisation?​
    11·1 answer
  • Why did the boy run from the pillow...... wrong answers only
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!