1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amiraneli [1.4K]
2 years ago
14

The information of an management information system comes from?

Computers and Technology
1 answer:
Debora [2.8K]2 years ago
5 0

A management information system is a computer system consisting of hardware and software that serves as the backbone of an organization's operations

You might be interested in
The java class library interface queue method tagg retrieves the entey at the front of a queue but themrows a NosuchElementExcep
SCORPION-xisa [38]

Answer:D) peek

Explanation:Peek operation or function is the method that is used for the returning of the values on the front of the queue or stack type datatypes.               This operation function over those datatypes having group or collection of the elements and does not eliminate any element from the queue.

NOsuchElemnet exception is shown when there is the peek operation in the queue for the element to be displayed on the top and no deletion can take place .Thus, the correct option is option(D).

5 0
3 years ago
What is the real meaning of hack and crack?
vovangra [49]
Hack means hack computer and crack means I guess your behind
7 0
3 years ago
To determine the type of power in use and to determine battery state or charge on a laptop, you ________.: course hero
Kryger [21]
<span> Hover the mouse over the power icon in the notifcation area</span>
3 0
3 years ago
The process of determining that a user has permission to perform a particular action on a computer is called
Doss [256]
I believe that would be authorization.
5 0
3 years ago
True or false? because you have made it a practice to never access the
Flauer [41]

Answer: False

Explanation: Even if the internet service is not connected with the operating system while accessing the database, it is still on risk and can be vulnerable to get attacked. Devices of the system like USB drive can happen to have the malware which creates the risk towards database.

The computer system can get invoked with the virus or other attack while the user connects the internet afterwards when he/she is not accessing the database, these malware get stored in system once they get invoked and corrupt the system and its database even when the internet connection is not present .Thus, the statement given is false.

6 0
3 years ago
Other questions:
  • Which option organizes tasks based on importance?
    12·1 answer
  • All spreadsheet formula should start with
    12·1 answer
  • What is the output of the following code segment? int n = 0; for (int k = 0; k&lt; 2; k++) {n=n +2;} cout &lt;&lt; n; oo 0 1 O O
    8·1 answer
  • How to code on python
    8·2 answers
  • ______ is a disadvantage of EDI.
    8·1 answer
  • Fill in the blank: _________ is Google’s machine-learning artificial intelligence system that interprets people’s searches to fi
    9·1 answer
  • Please help me with these questions​
    12·2 answers
  • Insertion point shows where the typed text will appear.
    5·1 answer
  • Data frames can be subset by a chosen value using ==.
    14·1 answer
  • What is the function of ALU? <br>​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!