define computer based information systems

Answers

Answer 1
Computer Based Information System (CBIS) is an information system in which the computer plays a major role. Such a system consists of the following elements: Hardware: The term hardware refers to machinery.

Related Questions

What is a trace route called in Windows 7?

Answers

Answer:

A Tracert is a trace route's nickname in Windows 7.

I will give brainyest
My dell Chromebook turned off and it won't turn back on and it's not dead. What do I do?

Answers

Answer:

Try charging battery for 25 minutes before attempting to power the Dell Chromebook system on. If the battery still won't charge, attempt to reset the EC. To do this, first shut the unit down and then press and hold the 3-key combination of ESC+ROUND ARROW+POWER.

:

turn it off or back on or get it checked out by a technechian

Explanation:

if it's a school chroombook then get the school to look at it

9. Look at the engine block shown in the figure. The engine shown in this figure is alan
O A. eight-cylinder, V-type engine.
O B. six-cylinder, V-type engine.
O C. four-cylinder, in-line engine.
O D.four-cylinder, horizontally opposed engine.

Answers

The engine block shown in the figure above is an example of four-cylinder, in-line engine.

What is the 4-cylinder inline engine?

The Inline-four engine is known to be called the Straight-four internal combustion engine that is said to be made up of  four cylinders.

Note that all four cylinders are placed in a straight line as shown in the image along a given single crankshaft. It is known to be powered by different kinds of fuels, such as gasoline, etc.

Learn more about engine from

https://brainly.com/question/25870707

#SPJ1

What is a device that makes calculations, stores data, and executes instructions according to a program

Answers

Answer:

computer

Explanation:

it's a computer

A computer is a device that makes calculations, stores data, and executes instructions according to a program.

In the following table, complete the marginal cost, average variable cost, and average total cost columns. Quantity Variable Cost Total Cost Marginal Cost Average Variable Cost Average Total Cost (Vats of juice) (Dollars) (Dollars) (Dollars) (Dollars) (Dollars) 0 0 30 1 8 38 2 18 48 3 30 60 4 50 80 5 80 110 6 120 150 On the following graph, use the orange points (square symbol) to plot the marginal-cost curve for Jane's Juice Bar. (Note: Be sure to plot from left to right and to plot between integers. For example, if the marginal cost of increasing production from 1 vat of juice to 2 vats of juice is $5, then you would plot a point at (1.5, 5).) Then use the purple points (diamond symbol) to plot the average-variable cost curve starting at 1 vat of juice, and use the green points (triangle symbol) to plot the average-total-cost curve also starting at 1 vat of juice.

Answers

The marginal cost of production is the change in total production cost which comes from making one additional unit.

What is the average variable cost?

The average variable cost is the total variable cost per unit of output. It is found by dividing the total variable cost (TVC) by the output.

The average total cost is found by dividing the total cost (TC) by the output.

The average variable cost is determined by dividing the total variable cost by the quantity produced. In this case, subtract the average variable cost from the average total cost: This will give the average fixed cost per unit.

Learn more about cost on:

https://brainly.com/question/25109150

#SPJ1

What is a possible weakness of an expert-novice pair?

They will not come up with new ideas.
They will not come up with new ideas.

They are more likely to take long breaks.
They are more likely to take long breaks.

The novice will be overwhelmed by the expert and not offer suggestions.
The novice will be overwhelmed by the expert and not offer suggestions.

They are not familiar with how existing programs work.

Answers

Note that a possible weakness of an Expert-Novice Pair is that the novice may be overwhelmed by the expert and not offer suggestions.

What is the rationale for the above response?

The above is based on the power dynamic that often exists between an expert and a novice.

The expert, being more experienced and knowledgeable, may dominate the conversation and decision-making process, leaving the novice feeling intimidated and less likely to speak up or offer their own ideas.

This dynamic can lead to an unbalanced collaboration where the novice's potential contributions are not utilized, potentially hindering the overall effectiveness of the team.

It is important for both parties in an expert-novice pair to recognize and work to mitigate this power imbalance to ensure a more equal and productive working relationship.

Learn more about Expert-Novice Pair:

https://brainly.com/question/2106820

#SPJ1


If your supervisor asks you to switch to a different word-processing software going forward, what soft skill is he hoping for?
A punctuality
B. honesty
c. flexibility
D. sociability

Answers

The soft skills developed in an employee with his supervisor allowing him to work on different software is flexibility. Thus, option C is correct.

What are soft skills?

Soft skills are given as the skills of an employee that helps the growth as well as the navigation to the success and achieving goals.

The development of skills that mediates the employee to work with the availability of the new projects and the helps in the growth with learning new techniques is given as flexibility. Thus, option C is correct.

Learn more about Soft skills, here:
https://brainly.com/question/14500704

#SPJ1

To improve security, a server should be decentralized.

Question 8 options:
True
False
Question 9 (0.5 points)
Switches are preferred over hubs because they reduce any unnecessary traffic.

Question 9 options:
True
False
Question 10 (0.5 points)
The purpose of a __________ is to connect all of the network devices together on an internal network.

Question 10 options:

Mainframe


Hub


PC


Client-server

Answers

The  security of network is improves with decentralization. The switch is preferred over hub. The hub mediated the connection of devices in the internal network.

What is the IT Structure?

The IT structure is given as the composition of the hardware modules, software products, network system with the database for providing services and projects.

The IT structure is more secured when it is decentralized. Thus, the given statement is true.

The switch function to maintain a MAC table over the address. With their ability to remove the unnecessary traffic in the channel, they are preferred over hub. Thus, the given statement is true.

The internal network has the connection of the network devices that are formulated with the Hub. Thus, option B is correct.

Learn more about IT structure, here:

https://brainly.com/question/13260104

#SPJ1

7.4.4: Length of User's Name

Answers

Answer:

user_name = input("input user name: ")
print(len(user_name))

Explanation:

input - input function in python

len - length of value

print - print data

In Python, you can calculate the length of a user's name using the built-in len() function.

What is the length of the string?

In Python, the length of the string can vary depending on the specific code being written. Python code can be as short as a single line or as long as multiple lines of code.

Here,
In Python, you can calculate the length of a user's name using the built-in len() function.


Here's an example code,

name = input("Enter your name: ")

length = len(name)

print("Your name has", length, "characters.")

In this code, the input() function prompts the user to enter their name and stores it in the name variable. The len() function is used to calculate the length of the user's name, which is then stored in the length variable. Finally, the length of the user's name is printed to the console using the print() function.

Thus, In Python, you can calculate the length of a user's name using the built-in len() function.

Learn more about the Length of the string here:

https://brainly.com/question/29126587
#SPJ2

The question seems to be incomplete,
The complete quesiton is,
how to calculate the Length of the User's Name in python?

What is the purpose of quick access toolbar?

Answers

Answer:

Toolbar grants direct (quick) access to a set of desired commands in a toolbar that is always visible no matter which ribbon tab is selected.

Explanation:


Given

who is the mother of computer

Answers

Answer:

Ada Lovelace

Explanation:

Ada Lovelace was known as the Mother Of Computer. Augusta Ada King, Countess of Lovelace was an English mathematician and writer, chiefly known for her work on Charles Babbage's proposed mechanical general-purpose computer, the Analytical Engine.

What is an advantage of using a fully integrated cloud based data analytics platform

Answers

Answer:

Using a cloud based data for for an analytics platform would give us an advantage because It cab provide the computing power that is needed to convert raw data into a meaniful info for decision makers.

one word for The characters typed by a user using a
keyboard.

Answers

Answer:

Alt codes hope this helps.

8) [Price] * [Quantity] is an example of a ________.


A. summary statistic


B. calculated field


C. logical operator


D. comparison operator

Answers

Answer:

Summary statistics

Explanation:

Option B is out of bussisnesLogical operatiors are and ,or ,not Comparison operatiors are ≥,≤

So option A is correct

It refers to the story or events in which the film revolves.

Answers

Answer:

What do you mean? What movie/film?

Explanation:

The boolean expression:
!((A < B) || (C > D))
is equivalent to which of the following expressions?


(A >= B) && (C <= D)

(A >= B) || (C <= D)

(A > B) || (C < D)

(A > B) && (C < D)

(A < B) && (C > D)

Answers

Answer:

(A > B) || (C < D)

Explanation:

Alicia wants to change the display of the Outlook Today window on her computer. After clicking on Customize Outlook Today, which steps should she follow to change the display from three columns to one column?

In the Startup area, click 1 from the drop-down menu.
In the Startup area, click Standard (one column) from the drop-down menu.
In the Styles area, click Standard (one column) from the drop-down menu.
In the Styles area, click 1 from the drop-down menu.

Answers

Outlook is the mailing program used to receive and send emails. The display from three columns to one column can be changed by clicking in the style's area and selecting the standard. Thus, option c is correct.

What is the style's area?

The styles area is the option in the Outlook used to change the format of how the display looks to the users in the mail area. They are found in the format text tab.

In the tab select the style's area and choose the standard option which is the one-column option that can be selected from the drop-down buttons.

Therefore, option c.  choosing the standard option in the style area is used to change the display.

Learn more about outlook here:

https://brainly.com/question/19755799

#SPJ1

Which of the following are examples of unstructured data?
Select one or more:

a) Phone Numbers
b) Dates
c) Credit Card Numbers
d) Social Media
e) Weather Channel Data

Answers

Answer:

social media

Explanation:

this includes text, audio, images, and video.

Debbie can use the feature in the email to copy her manager on the email without her colleague knowing she did so

Answers

Debbie can use the BCC feature (Blind Carbon Copy)

Tax preparation software can help prepare and file your taxes by _________.

A.making an appointment with a tax expert for you

B.posing questions to collect necessary information

C.calculating your taxes based on your savings account balance

D.providing you with blank tax forms you can fill out

Answers

Answer:

B. Posing questions to collect necessary information

Explanation:

Tax preparation software serves as software that makes filing as well as preparation of tax to be easier.

Tax preparation software can help prepare and file your taxes by posing questions to collect the necessary information. Thus, the correct option for this question is B.

What do you mean by Software?

Software may be defined as a set of instructions, data, or programs which are considerably utilized in order to operate computers and execute specific tasks with respect to the instructions. The function of the software is absolutely the opposite of the hardware.

According to the context of this question, tax preparation software automatically collects all sorts of data and information according to your credentials. These types of software help individuals in calculating their taxes on the basis of their income.

Therefore, tax preparation software can help prepare and file your taxes by posing questions to collect the necessary information. Thus, the correct option for this question is B.

To learn more about Softwares, refer to the link:

https://brainly.com/question/28224061

#SPJ2

Which of the following careers received the highest median pay in 2018?​

Answers

200 because ik the answers
Anesthesiologist received highest median pay in 2018

What is the DWT algorithm used for, while working with an EEG (a non-invasive brain-computer interface)?

Answers

Answer:

used to analyze the signals in time-frequency domain

Explanation:

What is a possible weakness of an expert-expert pair?

One is likely to be overwhelmed by the other.
One is likely to be overwhelmed by the other.

They are not familiar with how existing programs work.
They are not familiar with how existing programs work.

They are more likely to take long breaks.
They are more likely to take long breaks.

They may be too set in their ways to work together.
They may be too set in their ways to work together.

Answers

Answer:

They may be too set in their ways to work

Explanation:

Because as we know two negatives don't make a positive

The amount of time it takes to receive an item after it is requested is the _____.

Answers

Answer:

download time

Explanation:

because you have to download the item from the internet

The agency that started ARPANET was looking for
technologies that could be used by
O the military
O farmers
O transportation.
O electronics

Answers

Answer:the military

d

Answer:

A

Explanation:

Help me pleaseeeeeeee

Answers

Answer:

It has each number, zero through nine, listed in alphabetical order.

Missing only a few days of school will not impact your grades.
Please select the best answer from the choices provided
OT
OF

Answers

Answer:

Assuming this is a true or false question, it's false.

Explanation:

Part 2: Code the Program
Use the following guidelines to code your program.
1. Use the Python IDLE to write your program.
2. Using comments, type a heading that includes your name, today’s date, and a short description.
3. Set up your def main(): statement. (Don’t forget the parentheses and colon.)
4. Write one if-else statement using user input.
5. Include a print message for both conditions (True and False).
6. Conclude the program with the main() statement.
7. Follow the Python style conventions regarding indentation in your program.
8. Run your program to ensure it is working properly. Fix any errors you may observe.

When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE

u get brianliest if u can help

Answers

Answer:

You can try something like this:

# YOUR NAME

# May 16th 2022

# This program

def main():

   age = input("Enter your name: ")

   

   if not age.isnumeric():

       print('Invalid input.')

       return

       

   if (int(age) >= 18):

       print('You are an adult.')

   else:

       print('You are a minor.')

main()

Which of the following statements are true for a zero-day attack? [Choose all that apply.]



A zero-day vulnerability can only exist within the operating systems

A zero-day attack is impossible to detect as it exploits the unknown vulnerabilities

A zero-day vulnerability can be example of an unknown threat

A zero-day vulnerability can only be discovered when the software is deployed

Answers

The statement that is true for a zero-day attack is a zero-day attack is impossible to detect as it exploits the unknown vulnerabilities.

What is zero-day attack?

Zero-day is a computer software vulnerability. Zero-day attack is a situation in which the hacker finds the vulnerability of the software before the developer fix it.

Thus, the correct option is B, A zero-day attack is impossible to detect as it exploits the unknown vulnerabilities.

Learn more about zero-day attack

https://brainly.com/question/13057686

#SPJ1

Question 15 (4 points)
As a user is testing your prototype, you should not:
ask them what they're thinking.
Otell them which button to press.
Ogive them an overview of the product.
have them explain their actions.

Answers

When a user is testing the prototype the owner should not explain them about their actions. Thus, option D is correct.

What is a prototype?

A prototype can be understood as the original model  of the entire project over which the project will function.

If the new user is introduced to the prototype and asked to test it, then the owner cannot direct the user or explain the use r about what actions to be taken for testing the prototype.

Therefore, option D is correct.

Learn more about prototype, here:

https://brainly.com/question/14291377

#SPJ1

Answer: Tell them which button to press.

Explanation: Just took the test

Other Questions
What is (m - 5) divided by 4 where m = 17 From the ITAdmin workstation, use the tracert command to identify the devices in the path between ITAdmin and a remote computer on the internet that has an IP address of 206.8.28.127. How many routers are in the path between ITAdmin and the remote computer The fourth term of an arithmetic sequence is 20, and the 13th term is 65. Find the sum of the first 13 terms please anyone who knows.. Find the slope of the line that passes through (3, 6) and (8, 7) The eccentricity of the conic sectiongraphed is:a. Zerob. Between 0 and 1c. Oned. Greater than 1 Which of the followingwould be fully supported,without question, by Anti-Federalists?A. The ConstitutionB. The Ohio PlanC. Bill of RightsD. Federal Power David is developing a model of mitosis. He plans to represent a cell with a paper circle, and to represent 6 chromosomes with colored toothpicks.Which would be the most useful representation of metaphase? A. 3 toothpicks at one end of the circle, and 3 toothpicks at the opposite end of the circle B. 6 toothpicks at one end of the circle, and 6 toothpicks at the opposite end of the circle C. 6 toothpicks arranged in a line across the center of the circle D. 6 pairs of toothpicks, or 12 toothpicks total, arranged in a double line across the center of the circle E. 6 pairs of toothpicks, or 12 toothpicks total, arranged around the edge of the circle Which triangle is not similar to the other two triangles? A rectangular garden measures by 30ft and 40ft. Surrounding (and bordering) the garden is a path 3ft wide. Find the area of this path. Be sure to include the correct unit in your answer PLEASE HELP, will give brainliest A circle has a diameter of 12 units, and its center lies on the x-axis. what could be the equation of the circle? check all that apply. (x 12)2 y2 = 12 (x 6) y = 36 x y = 12 x y = 144 (x 6) y = 36 (x 12) y = 144 Which of the following groups of Americans is at a higher risk for developing cancer? American that are tobacco users Aging Americans Americans with excessive unprotected sun exposure Americans that drink alcohol excessively Americans with a family history of cancer Overweight/obese Americans European explorers and merchants established settlements along the coast of africa to ship products to sell in other parts of the world. what are some of the products you think where shipped . write sentences describing product or natural resources found in africa that would have been new to europeans in the seventeenth century. Please help! Select the correct answer. What are the factors of this quadratic function? the graph of a quadratic function with a maximum value at the point (3,4) and zeros at 1 and 5 A. (x 1) and (x 5) B. (x + 1) and (x + 5) C. (x 1) and (x + 5) D. (x + 1) and (x 5) Briefly explain one reason for a difference between the federal government's response to anxieties about communism within the United States from 1945 to 1955 and the federal government's response to anxieties about communism within the United States from 1917 to 1927. Angelo can run 3 miles in 22minutes. At this rate, how manymiles could she run in 33 minutes? . Match the responses in column B under the questions in column A ( 1pt each) A B_____ 1. Would you like some bread? A. How do you do.______2. Could I have a glass of water please? B. yes of course. Here you are.______3. How would you like your coffee? C. I am happy to meet you too.______4. How do you do ? D. I think he is Ahmed.______5. Who is the man coming here? E. Black, no sugar , please F. No, thank you G. Hi, Zerihun, how are you? I WILL GIVE BRAIEST PLS HELP 5 B LANGUAGE ARTS Module 11 / Proof and Edit 1. What order should you use to list your sources? the order in which they appear in your report. the order in which they were published. alphabetical order by author's last name. What government agency seeks to promote U.S. businesses interests inforeign markets?A. ITAO B. IRSO C. FTCO D. FDAHelp asap please