1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
borishaifa [10]
3 years ago
7

Read the following scenario:

Computers and Technology
2 answers:
Fofino [41]3 years ago
8 0

Answer:

I think it is the second answer choice honestly

Explanation:

I'm gonna say either the first one or second one because the word film has something to with behind the scenes work not being an actor.

mel-nik [20]3 years ago
3 0

Answer:

second one

Explanation:

You might be interested in
Which tab should you choose to add a picture from a file to your presentation?
Tems11 [23]

C. Insert

Insert will let you inseet different things into your presentation.

6 0
4 years ago
Requests to access specific cylinders on a disk drive arrive in this order: 24, 20, 4, 40, 6, 38, and 12, and the seek arm is in
GarryVolchara [31]

Answer:

The time required to seek using First come,first served algorithm is 876 milliseconds.

The time required to seek using Shortest Seek Time First algorithm is 360 milliseconds.

The time required to seek using LOOK (initialing moving upwards) algorithm is 348 milliseconds.

Explanation:

Part a,b : First-come, first-served:

The order of the cylinders is as 10, 22, 20, 2, 40, 6, 38

10 + 12 + 2 + 18 + 38 + 34 + 32 = 146 cylinders = 876 milliseconds.

ii) Shortest Seek Time First:

The order of the cylinders is as 20, 22, 10, 6, 2, 39, 40

0 + 2 + 12 + 4 + 4 + 36 + 2 = 60 cylinders = 360 milliseconds.

iii) LOOK (initialing moving upwards):

The order of the cylinders is as 20, 22, 38, 40, 10, 6, 2

0 + 2 + 16 + 2 + 30 + 4 + 4 = 58 cylinders = 348 milliseconds.

7 0
3 years ago
Explain Organizational approach to System Analysis and Design
9966 [12]

Answer:

The major goal of systems analysis and design is to improve organizational systems. Often this process involves developing or acquiring application software and training employees to use it. Application software, also called a system, is designed to support a specific organizational function or process, such as inventory management, payroll, or market analysis. The goal of application software is to turn data into information. For example, software developed for the inventory department at a bookstore may keep track of the number of books in stock of the latest best seller. Software for the payroll department may keep track of the changing pay rates of employees. A variety of off-the-shelf application software can be purchased, including WordPerfect, Excel, and PowerPoint. However, off-the-shelf software may not fit the needs of a particular organization, and so the organization must develop its own product.

Explanation:

Information systems analysis and design is a method used by companies ranging from IBM to PepsiCo to Sony to create and maintain information systems that perform basic business functions such as keeping track of customer names and addresses, processing orders, and paying employees. The main goal of systems analysis and design is to improve organizational systems, typically through applying software that can help employees accomplish key business tasks more easily and efficiently. As a systems analyst, you will be at the center of developing this software. The analysis and design of information systems are based on:

Your understanding of the organization’s objectives, structure, and processes

Your knowledge of how to exploit information technology for advantage

7 0
3 years ago
What does Boot Partition mean?
lukranit [14]

Answer:The system partition and the boot partition are computing terms for disk partitions of a hard disk drive or solid-state drive that must exist and be properly configured for a computer to operate. There are two different definitions for these terms: the common definition and the Microsoft definition. - Wikipedia.

Explanation:

8 0
4 years ago
External network security threats can include management failure to support organization-wide security awareness, inadequate sec
Ganezh [65]

Answer:

The answer is "Option B".

Explanation:

In external networking, it establishes the informal links beyond the size of the firm, which supports its career, and these networks may be used for help, invaluable guidance.

This system would be a different point of view to provide the privacy protection for the system connectivity, and in the internal system protects its system protects all its data, that's why it is false.

6 0
4 years ago
Other questions:
  • Generally speaking, manufacturing overhead is applied to production by means of a __________ __________ __________, which is com
    11·2 answers
  • A personal phone directory contains room for first names and phone numbers for 30 people. Assign names and phone numbers for the
    15·1 answer
  • To “synthesize” means to combine information to create new information.<br> YES or NO
    10·2 answers
  • Rank these three account types in order of decreasing liquidity. Start by picking the most liquid account type first
    13·2 answers
  • ____ are designed to be used with everyday objects, such as home appliances, gaming consoles, digital cameras, e-readers, digita
    12·1 answer
  • The Nigerian 4-6-9 scam refers to a fraudulent activity whereby individuals claiming to be from a foreign country will promise a
    11·1 answer
  • _________________________ are the countable products resulting from a program, while ________________________ are the changes in
    9·1 answer
  • PLEASE HELP!!!!!! ASAP
    6·2 answers
  • When preparing a technical document, do all of the following EXCEPT:_______.
    12·1 answer
  • Which file type is the best choice if the image will be made into a billboard?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!