1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler [38]
3 years ago
15

In the information systems (IS) department, the ________ group manages the process of creating new information systems as well a

s maintaining existing information systems.
Computers and Technology
1 answer:
Elodia [21]3 years ago
5 0

Answer:Operations

Explanation:Information system is the system that provides the knowledge about the technology and other related component working with the people.It has the function that help in the information and the communication technology.It has several function like analysis of the data, keeping record , processing etc.

The technique through which the data of the information system is managed and processed is considered in the category of the operations.Operation task manages the information that is previously stored as well as the current information.

You might be interested in
Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
kvv77 [185]

Answer and Explanation:

a)

For Go-Back-N:

  Host A sent total number of segments is 9.The initial segment numbers are 1,2,3,4,5 and re-sent the segemnts 2,3,4 and 5 because 2nd segment was lost.

Host B sent the number of ACKs are 8.Host B sent ACKs 1 by four times because 2nd segment was lost and sent 4ACKs with sequence numbers 2,3,4 and 5

selective repeat:

 Host A sent total number of segments is 6.The initial segment numbers are 1,2,3,4,5 and re-sent the segemnts 2 because 2nd segment was lost.

Host B sent the number of ACKs are 5.Host B sent four ACKs with sequence numbers 1,3,4,5 and re-sent ACK2 with sequence number 2 because 2nd segment was lost.

TCP :

Host A sent total number of segments is 6.The initial segment numbers are 1,2,3,4,5 and re-sent the segemnts 2 because 2nd segment was lost.

Host B sent the number of ACKs are 5.Host B sent four ACKs with sequence number 2 and There is one ACK with sequence number 6.TCP always send an ACK with expected sequence number

b) If the timeout values for all three protocol are much longer than 5*RTT,then TCP protocol successfully delivers all five data segments in shortest time interval.

 

4 0
3 years ago
Select four tasks associated with operating system maintenance. Cleaning inside the computer Defragmenting the hard drive Deleti
hram777 [196]

Answer:

Cleaning inside the computer

Defragmenting the hard drive

Deleting temporary files

Organizing data

Explanation:

7 0
2 years ago
(Drag each tile to the correct box)While surfing online, Patricia first checks her email and reads the latest messages. She then
Marizza181 [45]

Answer:

When Patricia checks her email use:

POP3

TCP

IP

When Patricia brows a website and log in to post a comment use:

HTTP

TCP

IP

LDAP

Explanation:

Email protocol

Patricia starts to check her email, the email application uses the protocol POP3.

The protocol TCP makes a connection with the server and transport the data.

Patricia receives her emails with the protocol IP on her computer.

Website protocol

Patricia started to surf and the protocol HTTP makes a connection with the internet.

The protocol TCP makes a connection with the server and transport the data.

With the protocol IP, she receives the website data.

With the protocol LDAP, Patricia makes a login to post the comment.

6 0
3 years ago
An effective team would never have​
MA_775_DIABLO [31]

Answer:

problems or struggles

Explanation:

i believe this because with an effective team most problems aren't there and you can understand and work out problems or struggles

4 0
3 years ago
True or false?
kenny6666 [7]

Answer:

True

Explanation:

An effective way of protecting programs against classic stack overflow attacks is to instrument the function entry and exit code to setup and then check its sack frame for any evidence of corruption.

5 0
3 years ago
Read 2 more answers
Other questions:
  • 6) RAM, 5 main memory<br>which storage conbe used<br>as permanent storage<br>Rom<br>a) R<br>)​
    8·2 answers
  • Which field of study would be most useful for a person who wants to work in a recycling plant?
    12·2 answers
  • What are the tyoe of typical application of mainframe computer<br>​
    6·1 answer
  • Encrypting text allows us to encrypt and decrypt the text using a special key.
    9·1 answer
  • I’ll mark brainliest, thanks
    10·2 answers
  • What is a hardware device that allows you to connect to several computers and other devices to a single internet connection
    6·1 answer
  • Please help ASAP!
    7·2 answers
  • I need help about computer program. Solve C language code...... please​
    7·1 answer
  • How do you describe Microsoft excel?
    13·1 answer
  • The price of an item you want to buy is given in dollars and cents. You pay for it in cash by giving the clerk d dollars and c c
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!