Answer: (A) Tactical support
Explanation:
GIS is the global information system in which the data is delivered worldwide in the form of information system. The global information system achieve long term goals in an organization.
- The tactical support is used in the global information system for concentrating the activities on the medium range in an organization.
- The tactical support is one of the effective way to producing the desirable result and also achieve the main strategic objective.
Therefore, Option (A) is correct.
Answer:
#include <iostream>
#include<string.h>
using namespace std;
void printCharacter(string name){
for(int i=0;name[i]!='\0';i++){
cout<<name[i]<<endl;
}
}
int main()
{
string name;
cout<<"enter the name: ";
cin>>name;
printCharacter(name);
}
Explanation:
first include the two libraries iostream for input/output and string library for using the string.
then, create the main function and declare the variable type string.
cout instruction is used o display the message on the screen.
cin is used to store the value in the name variable.
after that, call the function. The program control move to the the function. In the function for loop is used to print the character one by one until end of the name.
You manage small LAN for a branch office. The branch office has three file servers and few client workstations. You want to use Ethernet device and offer guaranteed bandwidth to each server. You design the network by <u>connecting all network devices to a switch. Connect each server to its own switch port.</u>
<u></u>
Explanation:
- A local-area network (LAN) is a computer network that spans a relatively small area.
- Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
- The LAN is the networking infrastructure that provides access to network communication services and resources for end users and devices spread over a single floor or building.
- Designing a LAN for the campus use case is not a one-design-fits-all proposition.
- If there is a single 48-port switch, 47 devices can be supported, with only one port used to connect the switch to the rest of the network, and only one power outlet needed to accommodate the single switch
Answer: Computers as target
Explanation:
Whenever an authorized access is made into a system it is a form of crime and it is called computers as target whereby one is able to access the system and get hands on unauthorized data and can also manipulate various activities which will have many dangerous effects.