Answer:
It is true, that in a management information system, the quality of information is determined by its usefulness to users, and its usefulness determines the success of the information system.
Explanation:
A management information system (MIS) is a computerized and centralized database that collects data from many different resources in the organization. And, then processes and organized the data in a way that would be useful and helpful in making a business decision. These days, for both large and small organization, collection of data and use of technology are so prevalent and these organization collecting the data from their businesses resources daily even hourly such as daily sale, daily expense, hourly wages, etc, and then managing it in a way to make a right business decision. A good MIS in an organization gives a competitive advantage because it turns the data into usable and into helpful information that can be used in making business decisions and strategy and to increase profit.
However, the information quality is based on its usefulness to the user or to the organization. Because if the MIS produces the information that is not useful to the user, the information and use of MIS are useless in the organization because the information that is required in making a business decision is not useful.
If the MIS produces the quality information to its user in making the right business decision and organization or user take the right decision that brings profit to the organization. Then, this use of information determines the success of an information system in an organization.
For example:
In a Bakery, the MIS produce the right information in making decision e.g. MIS produce information to bakery owner that on valentine day, most people buy chocolate. Then, the owner tries to meet the demand for chocolate on valentine's day. Therefore, this is the quality of information and it is determined by its usefulness to the bakery owner and its usefulness determines the success of MIS.
The correct answer for this question is this one: "B. biologists and chemists." A new drug to combat acne has been developed from a compound that is found in a melon. The <span>scientists would contribute to the development of the drug are biologists and chemists.
</span>
Here are the choices:
A. <span>chemists only
B. biologists and chemists
C. biologists, chemists, and physicists
D. biologists, chemists, and physicians</span>
A microcomputer is a small device composed of a central CPU with a microprocessor. Microcomputers are also called personal computers (PCs) and they are ultimately easier to transport.
<h3>What is a microcomputer?</h3>
A microcomputer refers to a personal computer, which is similar to an IBM PC device machine.
The term microcomputer was used in the 1970s, nowadays they are called personal computers, and PCs are being increasingly better both in usage and transportability.
The average personal computer has a weight of 20-30 pounds, in the future, it is believed that there will be no need for a personal computer (all data will be in the cloud).
Learn more about personal computers here:
brainly.com/question/4945544
Answer:
xcopy
Explanation:
xcopy (which stands for extended copy) command, was created to have several functions and ability to copy one or more folders, files or an entire directory from one location to another. It is more powerful than copy command that was seen in the first set of operating systems. It is currently being built into desktop operating systems and Microsoft windows server.
Attackers frequently use ACK scans to circumvent a firewall or other filtering tools. During a NULL scan, all packet flags are enabled. The most recent versions of Nessus Server and Client are compatible with Windows, Mac OS X, FreeBSD, and the vast majority of Linux variants.
<h3>What is ack scan ?</h3>
- ACK scans are used to identify hosts or ports that have been blocked or are resistant to other types of scanning. An attacker uses TCP ACK segments to learn about firewall or ACL configuration.
- Attackers probe our router or send unsolicited SYN, ACK, and FIN requests to specific UDP/TCP ports.
- TCP ACK Scan sends an ACK message to the target port to determine whether or not it is filtered.
- On unfiltered ports, a RST reply packet will be sent for both open and closed ports. Filtered ports will either generate no response or generate an ICMP reply packet with an unreachable destination.
- The TCP ACK scanning technique attempts to determine whether a port is filtered by using packets with the ACK flag set.
To learn more about ask scan refer to:
brainly.com/question/13055134
#SPJ4