1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rusak2 [61]
3 years ago
13

What are the 3 dimension of an information system?

Computers and Technology
1 answer:
Ne4ueva [31]3 years ago
3 0

Answer:

There are three dimensions of information systems ; organizational, management, and technology. Senior management always make decisions, so senior management is required to understand these three dimensions to make better decisions of the business through information systems.

You might be interested in
Describe what a Bank Run is.
Musya8 [376]

Answer:

Explanation:

A bank run occurs when a large number of customers of a bank or other financial institution withdraw their deposits simultaneously over concerns of the bank's solvency. As more people withdraw their funds, the probability of default increases, prompting more people to withdraw their deposits.

8 0
3 years ago
You need a collection to represent secret agents. Every agent has a unique codename that identifies them, and an Agent object th
Scrat [10]

Answer:

A  HashMap< String, Agent >

is a best collection for this

Explanation:

Collection is basically a framework that is used in order to perform operations on data and to store and manipulate objects.

HashMap is a Map based collection where Map is a data structure of interface which allows the key and value pairs mapping and HashMap is a collection class used to store these key-value pairs of data.

The syntax is:

HashMap<key, value>

So in  HashMap< String, Agent > statement the String is used to store the codename for every agent and Agent is an object that represents each agent. So this is represented as key-value pair using HashMap.

4 0
4 years ago
How does machine learning help to make modern Web Application Firewalls more effective? (Choose two.)
MissTica

Answer:

Option(a) and option(d) are the correct answer for the given question.

Explanation:

In this question options are missing so the options of this question is given below.

a Behaviour analysis can be done at the machine speeds.

b Search results are returned by the quicker than using traditional method of  

filtering

c Adapted the ever-changing attributes of an threat.  

d choose the most appropriated web application for the given task.

Web Application Firewalls are the effective which helps in learning for the machines to make it modernized. So, that's why the analyzing of the behavior could be done at the speed of the machine and also select that appropriate web applications for the following tasks. That's why the following options are true for the given question.

8 0
4 years ago
Consider the following code: public static void mystery(int a) { System.out.println("A"); } public static void mystery(double a)
Feliz [49]

Answer:

The output is "A"

Explanation:

public class Solution {

   public static void main(String args[]) {

     mystery(7);

   }    

   public static void mystery(int a) { System.out.println("A"); }    

   public static void mystery(double a) { System.out.println("B"); }    

   public static void mystery(int a, double b) { System.out.println("C"); }    

   public static void mystery(double a, int b) { System.out.println("D"); }

}

In the code above; mystery is defined in four different ways called method overloading. Method overloading is when same method is defined with different parameters.

In the first case; mystery will be called if the argument is int.

In the second case; mystery will be called if the argument is double.

In the third case; mystery will be called if the arguments are int and double.

In the fourth case; mystery will be called if the arguments are double and int.

When mystery(7) is called; the mystery method requiring only int will be called and the output is "A".

3 0
4 years ago
Brenda has created a Microsoft Excel spreadsheet which has 1000's of cells of data. She is looking for specific information in t
vichka [17]

Brenda should use the Ctr+F shortcut to quickly find a specific information in the spreadsheet file.

4 0
3 years ago
Other questions:
  • His function starts a new session.
    12·1 answer
  • After installation of SSL certificate website asking for username and password.
    6·1 answer
  • What is the maximum rate at which computers A and B can communicate, via router X? (your answer should be in Mbps)
    12·1 answer
  • What is the term meaning a Java object that has attributes and methods?
    12·1 answer
  • The amount of RAM storage is measured in A: GB The rule of thumb that predicts that CPU capacity will double every 2 years is ca
    11·1 answer
  • Which guideline would not promote energy conservation?
    15·1 answer
  • Use the drop-down menus to complete the sentences about the Calendar view Arrange command group.
    6·1 answer
  • You want to purchase a computer, and the salesperson refers to separate pricing for a system unit and for the software applicati
    9·1 answer
  • Suppose you are developing a cricket game in which you are asked to enter score of every ball and can score maximum 6 on each ba
    15·1 answer
  • "Automated Deployment" is one of the prerequisite for DevOps implementation.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!