1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhannawk [14.2K]
2 years ago
7

What is a thoughtware​

Computers and Technology
1 answer:
enyata [817]2 years ago
4 0

Explanation:

plzz write it and plzzzz Mark me brainliest

You might be interested in
I need a free flashdrive can anyone tell me any website links so i can get one for free????​
olga55 [171]

Answer:

wish

Explanation:

look for one that is free

4 0
3 years ago
Implement a function getContent() that takes as input a URL (as a string) and prints only the text data content of the associate
Reil [10]
Print is good but url is not
3 0
3 years ago
A feature that displays in the lower right corner of a selected range with which you can analyze your data by using Excel tools
bagirrra123 [75]

Answer:

Quick analysis tool.

Explanation:

Excel is a spreadsheet application package found in the Microsoft office suite. it's environment on the display screen is called a worksheet and a collection of the worksheets is called a workbook. The excel packet is used for data analysis and interpretation and presentation.

When a group of cells in a worksheet is selected, a small tool kit appears that the lower right corner, it is known as a quick analysis tool. It is use for easy and fast analysis and formatting of that selected group.

5 0
3 years ago
Read 2 more answers
What are the six primary roles that information system play in organizations? How are information system used in each context
Nina [5.8K]

The primary roles that information system play in organizations are:

  • Decision making
  • Operational management
  • Customer interaction
  • Collaboration on teams
  • Strategic initiatives
  • Individual productivity
<h3>How are information system used in each context</h3>

The six main functions of information systems in an organization are as follows:

1. Operational management entails the creation, maintenance, and enhancement of the systems and procedures utilized by businesses to provide goods and services.

2. Customer relationship management: Maintaining positive and fruitful relationships with customers, clients, students, patients, taxpayers, and anyone who come to the business to purchase goods or services is essential for success. Effective customer relationships contribute to the success of the business.

3. Making decisions: Managers make decisions based on their judgment. Business intelligence is the information management system used to make choices using data from sources other than an organization's information systems.

4. Collaboration and teamwork: These two skills complement the new information systems that allow people to operate from anywhere at a certain moment. Regardless of their position or location, individuals can participate in online meetings and share documents and applications.

5. Developing a competitive edge: A firm can establish a competitive advantage by outperforming its rival company and utilizing information systems in development and implementation.

6. Increasing productivity of objection: Smart phone applications that mix voice calls with online surfing, contact databases, music, email, and games with software for minimizing repetitive tasks are tools that can help people increase productivity.

Learn more about information system from
brainly.com/question/14688347
#SPJ1

4 0
1 year ago
____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to pa
Talja [164]

Answer: Zombies

Explanation: Zombie is a computer device that is responsible for the compromising the system and making it prone to several destruction such as the Trojan horse virus,hackers and other viruses as well. Zombie makes the computer system to get malfunctioned easily ,that is without much security and various malicious functions can be performed.They basically act as the infected computer .

6 0
3 years ago
Read 2 more answers
Other questions:
  • You are tasked with setting up an employee’s computer.Instead of a new computer,she will be using a computer with an older opera
    11·2 answers
  • you were discussing software privacy with a friend were surprised to learn how software privacy can impact your life everyday. w
    10·1 answer
  • WHICH OF THE FOLLOWING LOOKS JUST LIKE A CD ROM BUT CAN STORE MUCH MORE INFORMATION
    8·2 answers
  • Plz help ASAP
    10·1 answer
  • What features are provided by most GUIs?
    7·1 answer
  • Claire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of
    13·1 answer
  • Which situations are better suited to an indefinite (while) loop? Select 3 options.
    5·2 answers
  • Which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data
    12·1 answer
  • Put these numbers in order from smallest to largest:<br> 1. 00101112<br> 2. 011110<br> 3. 011110112
    12·2 answers
  • the 4gl languages that enable nonprogrammers to use certain easily understood commands to search and generate reports from a dat
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!