1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shutvik [7]
4 years ago
5

Which type of system is used to analyze, evaluate, and integrate the output of other systems?

Computers and Technology
2 answers:
ratelena [41]4 years ago
8 0

Answer:

The management information system.

Explanation:

Had to do some research to help you out on this lol. have a good day.

bulgar [2K]4 years ago
6 0

Answer:

I believe it is Management Information Systems.

Explanation:

Since it would be the one to manage the output of the other systems.

You might be interested in
In a program you need to store identification numbers of 5 employees and their weekly gross pay.
Allushta [10]

Solution :

a). The two arrays that are used in parallel in order to store the identification of two numbers of 5 employees and their weekly gross payments is  :

  int id_array[5];

  double gross_pay[5];

b). The loop that uses the arrays for printing the identification number and the weekly gross payment  is given below :

 for(int i=0; i<5; i++)

  {

  count <<id_array[i] <<" " << gross_pay[i] << end;

  }

4 0
3 years ago
Mary is writing an article about the animal kingdom. She wants to place image below the text. Which menu should Mary choose for
marysya [2.9K]

The Wrap Text menu.

The positioning of text in Word is sometimes not lined up with the inserted picture. By default, when you insert an image or a picture, its layout is set to inline with text. To change that, double click on the picture and then click the Wrap Text option. A number of options will pop up with text graphics.


7 0
4 years ago
Read 2 more answers
A technician is training a new hire on sealing an RJ-45 connector to the end of an Ethernet cable. Which tool is the technician
Aleonysh [2.5K]

<em>The answer is Crimper. </em>

<em> </em>

<em>Crimper is a networking device that would allow RJ-45 pins to get attached to UTP(Unshielded Twister Pair), CATs (Category Ns) and STPs (Shielded Twisted Pair) Cables. These are common type of cables used in computer networking. A crimper looks like a pliers only it has narrow ends with a hole where you would put RJ-45 devices together with the cables. In order to make the cable hold on to the RJ-45, the two hands must be squeezed together with an exact force (not too much force). Once the crimper made a sound, that means, your RJ-45 is now locked with the cables inside.  </em>

<em> </em>

<em>You must be very careful when using this device. Sometimes crimpers has blades that could peel off cables or cut them for alignment and proper attachments. A pair of gloves and googles are also advisable to wear when you use this device for safety measures.</em>

8 0
4 years ago
What is some effective writing techniques?
scoray [572]
Be persuasive, have form, and know what you are talking about. I would recommend using MELCON.  You can learn more about MELCON with this link.  http://melcon.weebly.com/
3 0
3 years ago
Which of the following statements are true about file naming conventions? Check all of the boxes that apply.
Korolek [52]

Answer:

last one check it and the second one

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • ____ data exist in a format that does not lend itself to processing that yields information.
    8·1 answer
  • Computer communications describes a process in which two or more computers or devices transfer ____.
    10·1 answer
  • Jeremy is typing a term paper on his computer and saves it every five minutes or so for good measure. which of the following bes
    11·1 answer
  • A ___ is an organized collection of data in digital format that helps users to keep
    5·1 answer
  • Create a dictionary password cracker or a brute force
    13·1 answer
  • A trust domain is defined as Select one: a. The agreed upon, trusted third party b. A scenario where one user needs to validate
    5·2 answers
  • A list is a collection that ______________
    9·1 answer
  • What is Error Code: 232011
    11·2 answers
  • How is data written to a blockchain?
    10·1 answer
  • KELLY Connect
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!