1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
3 years ago
11

Which of the following describes an executive information system (EIS)?

Computers and Technology
1 answer:
rjkz [21]3 years ago
3 0
I think the answer is b

hope this helps :)
You might be interested in
Help help help help help!!!
Usimov [2.4K]

Answer:

A. Cut to length or B. depending on the questions

3 0
3 years ago
In additon to setting up services, what other tasks does a sysadmin have to keep in mind? check all that apply.
kotegsom [21]

Tasks that a sysadmin have to keep in mind are:

  • Security Patches (A secure network is an important responsibility for SysAdmin)
  • Routine Updates (services need to be updated)
  • Maintain Compatibility

<h3>What is sysadmin?</h3>

A system administrator, or sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as servers.

The system administrator seeks to ensure that the uptime, performance, resources, and security of the computers they manage meet the needs of the users, without exceeding a set budget when doing so.

To meet these needs, a system administrator may acquire, install, or upgrade computer components and software; provide routine automation; maintain security policies; troubleshoot; train or supervise staff; or offer technical support for projects.

Learn more about SysAdmin

brainly.com/question/20381778

#SPJ4

5 0
1 year ago
Tim has several workbooks open in the Excel application. He would like to view them all at the same time, so he should use the _
anastassius [24]

Answer:

Arrange All

Explanation:

For him to to view them all at the same time, so he should use the Arrange All

command. To do this, you will need to

Open the workbooks that is needed to arrange, in this case at least two workbooks are to be opened, then make selection of the worksheet in each workbook that is needed to be displayed, then on the view tab, you can make selection of "Arrange All button" in the Window.

4 0
3 years ago
What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web se
jek_recluse [69]

Answer:

Port 443

Explanation:

This is the Hypertext Transfer Protocol Secure that combines the HTTP with a cryptographic protocol, which can be used for payment transactions and other secure transmission of data from Web pages. Whenever you connect to a website beginning with "https://" or you see the lock icon, you’re connecting to that web server over port 443.

4 0
3 years ago
What type of attacks take advantage of vulnerabilities in poorly coded web application software to introduce malicious program c
Yakvenalex [24]

Answer:

SQL Injection

Explanation:

Coding a web application that uses a database is requiring close attention, where the developer closes any loophole any attacker may later want to exploit when the application is deployed. SQL Injection is a type of attack where the attacker places malicious code in the query statements through the form. This is possible if the input is not properly sanitized and cleaned.

5 0
3 years ago
Other questions:
  • White arrows in the middle of the lane indicate whether the lane must __________.
    8·2 answers
  • Why might a government entity choose to offer some information and services online as in e-government
    8·2 answers
  • What do you call the process of translating statements written by a developer? What is the result of this process?
    6·1 answer
  • 1.Which type of camera tool pushes the picture back and makes it wider, exaggerating the distance between the background and for
    13·2 answers
  • On most desktop computers, most of the USB ports are on the back of the computer case. Generally, you'll want to connect your mo
    13·1 answer
  • When one user could perform a query to determine which recordings had a track length of four minutes or more, and another user c
    9·1 answer
  • Convert 78 to binary
    6·2 answers
  • What is the positional weigh of the digit 7 in the octal number 7642 ?​
    15·1 answer
  • Read the scenario below, and then choose the right type of computer for each person from the drop-down menus. Three of your frie
    12·1 answer
  • If anyone knows how to code on python:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!