Answer:
"Computer Based Information system (CBIS)" is the correct answer for the above question.
Explanation:
- CBIS means about that system that is used to produce the information or process the information and it is computer-based because CB stands for computer-based and IS stands for an information system.
- It means that a system that helps by the computer and it is used to process the information then it can be called CBIS.
- To process the information in a computer system there is a need for software, people, database, hardware and processor which is a set of CBIS.
- The above question also wants to ask about the system which is a set of software, people, database, hardware and processor then it is known as CBIS which is described above. Hence the answer is CBIS.
Answer:
A. C to clear any previous calculations.
hope it helps...
Answer:
The answer is "Procedure"
Explanation:
In the given statement certain information is missing, that is choices, which can be described as follows:
a. procedure
b. software
c. data
d. hardware
e. memory
The procedure is a way, that accomplishes any task in the following steps, if there is a long process so, we divide this process into parts or modules to accomplish the task, and certain alternative was wrong, that can be described as follows:
- Software is a program, that is accomplished in the procedure.
- data, It describes all procedures.
- hardware, It is a device, in which we work.
- memory, It stores all the data in a procedure.
<span>After connecting to an ftp site, the mget command will upload multiple files.
</span><span>The </span>mget command<span> retrieves multiple files from a remote server directory and stores them in the current local directory.
</span><span>ftp> mget <start of the like files> *
</span>
ftp> mget file01 file02 file03
ftp> mget filename*
ftp> mget *.txt
Answer:
ICMP.
Explanation:
Hackers might use ICMP for gain knowledge about current system addresses and specific procedures as part of a reconnaissance process.
ICMP is a failure informing system used by network protocols such as routers to produce warning to that of the source Address while network issues interrupt IP packet transmission.