1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna11 [10]
2 years ago
10

Decision support systems help managers use structured data to identify problems and find solutions to business-related problems.

The financial management system is an example of this system.
Computers and Technology
1 answer:
xxMikexx [17]2 years ago
3 0

Answer:

sorry about this

Explanation:

You might be interested in
Which of these statements are true of verifying that a program’s code is fixed? Check all of the boxes that apply.
aksik [14]

Answer:

Its C.

Explanation:

hope it helps !

mark me brainliest :))

7 0
3 years ago
Read 2 more answers
How do you do this question?
laila [671]

Answer:

(a) 1 to 8

(b) 1 to 6

Explanation:

A "leaf" is a node at the end of a binary tree (in other words, it has no "children").  All other nodes are "non-leaf" nodes.

The smallest number of leaves is 1.  That would be a binary tree that's just a straight line; each node will have only 1 child, until you get to the last node (the leaf).

To find the largest number of leaves, we start drawing a full binary tree.  A complete tree with 15 nodes has 7 non-leaf nodes and 8 leaf nodes.  A full tree with 6 non-leaf nodes can have up to 6 leaf nodes.

6 0
3 years ago
Read 2 more answers
30 points! Help me out, please! I need help with this!
White raven [17]

Answer:

Both are touchscreen.

Tablets are seen more as an entertainment device (tv, games, etc.).

Phones are smaller, and used more for everything; you can take phones anywhere you go, whereas tablets are more difficult to transport.

7 0
3 years ago
The Matlab Script should:1. Clear the command window2. Clear the workspaceQuestion 1: Why do we clear the command window and wor
finlep [7]

Answer:

This is done for the simple reason of having more space to work on

Explanation:

This is done for the simple reason of having more space to work on. By clearing the command window and workspace you provide yourself with sufficient space to create new commands without the clutter of the previous commands. This also prevents your focus from shifting towards old commands and allows you to simply focus on the commands you are currently working on. This does not clear all variables from the script, it only clears the current screen but the previous commands can still be accessed by using the up-arrow key

5 0
2 years ago
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
coldgirl [10]

Answer:

The answer is "timing".

Explanation:

  • The time attack would be a security vulnerability that enables attackers that identify computer systems or network security issues by analyzing the period of the program's reaction to multiple levels.  
  • It is used in both RSA encryption and decryption of the modular exponentiation method but could be modified for just about any system not seem running in a fixed period.
6 0
3 years ago
Other questions:
  • An effective technology for e-training and e-learning is __________, which uses computer graphic displays that the user can adju
    12·1 answer
  • Who were called “freedmen” during the reconstruction period?
    15·2 answers
  • What is network hardware?
    10·1 answer
  • An incurred cost that cannot be recovered, which is irrelevant for all decisions about the future, is included in the projected
    14·1 answer
  • Semantic search engines use NLP, contextual cues, synonyms, word variations, concept matching, specialized queries, and other st
    6·1 answer
  • Can i add ADSence on bangla content in blogsopt website?
    12·1 answer
  • _________________ ___________________ is an encrypted code that a person, website, or organization attaches to an electronic mes
    9·1 answer
  • You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys. The next time you log on, your screen ha
    9·1 answer
  • With a heat exchanger, the temperature of the process fluid can be measured with a temperature-
    14·1 answer
  • What are web protocols.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!