1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amiraneli [1.4K]
2 years ago
14

The information of an management information system comes from?

Computers and Technology
1 answer:
Debora [2.8K]2 years ago
5 0

A management information system is a computer system consisting of hardware and software that serves as the backbone of an organization's operations

You might be interested in
Write short notes on the following:<br>I. keyboard ii.Control unit iii.printer​
Andreas93 [3]

Answer:

- the Keyboard:

The keyboard is a handheld device used to input alphabet, numbers, symbols and characters to a monitor. It also houses the special manipulative and function keys.

- the Control Unit:

The control unit is a component of the CPU which directs the operation of the processor.

- the Printer:

The printer is an external hardware output device which takes electronic data stored on a device and creates a hard copy.

4 0
2 years ago
A colleague has included you on an email that is irrelevant to you, but it continues to come to your inbox because people are us
Law Incorporation [45]

on google there is a mute function with the 3 dots on the top and outlook has it in the same location but under the word of "ignore"

7 0
3 years ago
1) Design a class named Axolotl that holds attributes for an axolotl's name, weight, and color. Include methods to set and get e
crimeas [40]

what subject is this exactly?

5 0
2 years ago
Discuss the software development methodology you would use for developing a software product for insurance agents, and state val
nadya68 [22]

Answer:

It depends on what the company will be willing to use and it also depends on their budget

Explanation:

4 0
3 years ago
An attacker captures an encrypted message. he tries decrypting with every possible key until the decryption process reveals a se
strojnjashka [21]
Brute force. He's not using any information to mathematically derive information about the key, just trying all possibilities. With modern key sizes this is typically not a successful approach.
8 0
3 years ago
Other questions:
  • Which key do programmers use to end running programs?
    14·2 answers
  • In microsoft word, when you highlight existing text you want to replace you are
    10·1 answer
  • Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin type per l
    7·1 answer
  • One of the disadvantages of an e-marketplace is that it cannot provide a single platform for prices. true or false?
    10·2 answers
  • A database, a database management system, and the application programs that use the data, make up a database environment.
    15·1 answer
  • SOMEONE HELP PLEASE ​
    5·1 answer
  • Do you guys know if there's a way for me to find a Google doc that I typed but forgot to save if you do it for points i will rep
    10·2 answers
  • Which ribbon tab is not a default in Outlook 2016's main interface?
    13·2 answers
  • Value appears on the left hand side of cell <br> true or false
    15·2 answers
  • You will need to convert the following binary numbers to hexadecimal. Table 1 contains 16 problems. The first one is completed f
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!