Answer:
okay i know only 1st question and answer
answer:rapid application development
Search engines - there was no single way to ask a question
An information system is crucial to the success of a business. Itemized below are five benefits of operating an information system in a business.
<h3>What are the benefits of an Information System?</h3>
Information systems are important because:
- They help to increase and enhance operational efficiencies such as accounting, sales, inventory, and HR operations.
- They help to minimize costs. As the business makes more and more informed decisions, its costs will drop.
- It enhances customer service. Information about customers helps the business to tailor its services to the requirements of each customer.
- Information system helps the decision-makers in the business to make better and more informed decisions.
- Information systems help to ensure business continuity.
<h3>What are the requirements for creating an information system?
</h3>
An information system requires the following:
- Hardware for the computer workstation and addendums
- Software
- A network communication amongst the computers and hardware
- a map of the company's processes and the people responsible for such processes
- A procedural manual.
- Existing data from the business.
For the barber's shop, for example, some of the components of the information system he must put in place are:
A workstation that collects information about:
- Clients
- Details of Sales
- Expenses
- Compliance dates and records etc.
Learn more about Information Systems at:
brainly.com/question/25226643
Answer:
The code is given below
hours = int(input("Enter time in hour: "))
minutes = int(input("Enter time in minute: "))
total time = (hours * 60) + (minutes + 15
)
total hours = int(total minutes / 60)
minutes = total hours/ 60
print("Hours: " + str(hours))
print("Minutes: " + str(minutes))
Answer:
Network scan
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.
Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.
A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.