1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Diano4ka-milaya [45]
3 years ago
7

Old systems can be useful when designing new computer software. True or False

Computers and Technology
2 answers:
jenyasd209 [6]3 years ago
3 0
True! Just ask Apple incorp
inessss [21]3 years ago
3 0
Correct answer:
True
You might be interested in
Ronaldo wants to determine if employees would prefer having bagels or
nikklg [1K]

Answer:

surveys and questionnaires

7 0
3 years ago
Which of the following are considered transactions in an information system?
Marrrta [24]

Answer: (C) All of them.

Explanation:

 All the given options are example of the transaction in the information system.

As, the money deposited in the bank account is the process that take place computerized for transaction purpose. Now a days we can easily done transaction through wire transfer at anywhere and anytime by using the information system technology.  

Students can easily study online and also record their answers in the online test by using the information system technology.  

Customers can also doing shopping online by adding various products and items in the online shopping cart by using various e-commerce websites like amazon, flip-cart etc.  

5 0
3 years ago
True or False <br><br> MAC addresses are assigned by the router along with your IP address.
Oduvanchick [21]
True. If you look at the router it will correspond with your MAC address
4 0
3 years ago
Key exchange is so important that you should write your own to avoid bugs in other people s libraries. (
lana [24]

Answer:

The answer to this question is the option "a".

Explanation:

key exchange is a method of cryptography(It is a method of protecting data through the use of codes like [email protected]#.) by which the data exchange between two parties. It follows a cryptographic algorithm. The key exchange also used for key establishment.key exchange is used for data encryption so the answer to this question is true.

8 0
3 years ago
When a project is saved, the new file name appears on the ____ tab?
BartSMP [9]
It appears on Document window tab
7 0
3 years ago
Other questions:
  • Define the method object inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids.Sample output for the g
    11·1 answer
  • Define a method printAll() for class PetData that prints output as follows with inputs "Fluffy", 5, and 4444. Hint: Make use of
    10·1 answer
  • Which of the following is a bad password? Select one: a. The acronym for the title of your favorite song plus the year it came o
    11·1 answer
  • _____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web b
    8·1 answer
  • Garrett wants to search through a csv file to find all rows that have either the name John or Bob in them and display them out t
    9·1 answer
  • Voltage drop across the resistor
    9·1 answer
  • Given the declaration Circle x = new Circle(), which of the following statements is most accurate?
    11·1 answer
  • Answer to this problem
    11·1 answer
  • Explain the different type of shift register counter ​
    14·1 answer
  • A ____________ is a collection of infected IT devices that an attacker or attack group controls.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!