In a ________ system configuration, separate information systems are designed and managed by each foreign unit.

Answers

Answer 1

Answer:

In a decentralized system configuration, separate information systems are designed and managed by each foreign unit.

Explanation:

hopes this help (:


Related Questions

what are computer networks​

Answers

Answer:

A computer network is a set of computers sharing resources located on or provided by network nodes. A computer network is a system that connects numerous independent computers in order to share information (data) and resources.

Explanation:

:)

Encoding in the information processing theory is the process of _____

Answers

Encoding in the information processing theory is the process of inputting of information into the memory system.

What is encoding?

Encoding is an act or a system method that is used in the inputting of information into the computer memory system.

It entails the storage in the retention of encoded information. After encoding is the Retrieval method that is the act of getting the information out of memory.

Learn more about encoding from

https://brainly.com/question/3926211

In information processing theory, encoding is the process of inserting data into a memory system.

What exactly is encoding?

Encoding is an act or a systematic method for entering data into a computer memory system.

It involves the storage and retention of encoded data. The Retrieval procedure follows encoding and is the act of retrieving information from memory. The process of converting thoughts into communication is known as encoding in information processing theory.

Learn more about encoding from this website.

brainly.com/question/3926211

#SPJ4

I have a question, but it's not a math question. Can anyone give me 5 unblockers for school computers? If you answer this, you will get a hefty point reward. Thanks :)

Answers

Answer:

I mean if your talking about games then just try Cool math I will give link in comments

Explanation:

Answer:

I have 4.

Explanation:

DOWNLOAD AVAST SECURELINE VPN. Get it for Android, iOS, Mac.

DOWNLOAD AVAST SECURELINE VPN. Get it for iOS, Android, PC.

INSTALL AVAST SECURELINE VPN. Get it for PC, Mac, iOS.

INSTALL AVAST SECURELINE VPN. Get it for Mac, PC, Android.

Have a great day!
#EquestrianLion

Choosing what data to store and where and how to store the data are two key challenges associated with big data. true or false

Answers

Answer:True

Explanation:

40 points for this question
Digital citizenship focuses on _____. Select 3 options.

enforcing your rights on others

helping and leading others

targeting potential cybercriminals

creating positive online experiences

promoting the common good

Answers

Answer:

I think the answers are

the second one the third one the fourth one

hope it helps!

Digital citizenship focuses on the following:

B. helping and leading others

C. targeting potential cyber criminals.

D. creating positive online experiences

What is digital citizenship?

Digital citizenship is the ability of a person to learn and engage in digital relationships and learn how to use the system and parts of the digital system, like to use a keyboard, mouse, etc.

It also refers to the development of the skills related to digital communication, relationships, and how to practice dignity and respectful behavior on digital platforms.

The main focus of digital citizenship is helping other people to learn and grasp and be aware of cyber crimes and bullying and creating a positive environment.

Thus, the correct options are B. helping and leading others

C. targeting potential cyber criminals.

D. creating positive online experiences

To learn more about digital citizenship, refer to the link:

https://brainly.com/question/11542933

#SPJ5

Answer the questions given below, share your ideas.Use the space for your answer.

Pa answer pi.:^)​

Answers

Answer:

I would get rid of the machine and well

Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes sure their nics is not running in promiscuous mode

Answers

Answer:

Network Sniffing

Explanation:

Network sniffing is basically know to be the act of tapping into network traffics and modifying unsafe requests for both good and bad purposes.Network sniffing is also known as Packet Sniffing which means as its name implies; sniffing chunks of packets on a network. This kind of attack mostly arise when a user exposes their device to unsecured Wi-Fi networks.So using ethernet with softwares (Network monitoring softwares) I think would paly an important role in curbing such attacks.

Packet Sniffing is the type of attack can be addressed using a switched Ethernet gateway and software on every host on network that makes sure their nics is not running in promiscuous mode.

How is packet sniffing done?

Packet sniffing is done with packet sniffer software. It can be filtered or it can be unfiltered. When just specified data packets must be captured, Filtered is used; when all packets must be captured, Unfiltered is used.

Packet sniffing tools such as WireShark and SmartSniff are examples.

Thus, Packet Sniffing can be addressed using a switched Ethernet gateway.

For further details about Packet Sniffing click here:

https://brainly.com/question/14417640

#SPJ4

Fill in the blank by selecting the correct option. Ethical codes may not address because they are written quite broadly

Answers

Ethical codes may not address all of organization's ethics because they are written mostly by a task force committee of SHRM members and leaders.

What does codes of ethics address?

A code of ethics are known to have or contains some professional conduct outlines. They are regarded as ethical principles that helps to rule  or monitors decisions and behavior at a firm.

They are known to states the  general ways of how employees should behave in the office , as well as some other guidance for settling issues such as harassment, safety, etc.

Learn more about  Ethical codes  from

https://brainly.com/question/24606527

5. 16 LAB: Brute force equation solver

Numerous engineering and scientific applications require finding solutions to a set of equations. Ex: 8x + 7y = 38 and 3x - 5y = -1 have a solution x = 3, y = 2. Given integer coefficients of two linear equations with variables x and y, use brute force to find an integer solution for x and y in the range -10 to 10.


How do I write this in python?

Answers

Use the knowledge of computational language in python to write a code that force to find an integer solution for x and y .

How to find the solution of an equation in python?

To make it simpler the code is described as:

def brute_force_two_equations(first_values, second_values,

                             max_range=10, min_range=-10):  

for x in range(-10, 10, 1):

   for y in range(-10, 10, 1):

      if a * x + b * y == c and d * x + e * y == f:

          print(x, y)

else:

   print('No solution')

def equation(const1, const2, x, y):

   return const1 * x + const2 * y

def get_three_integers():

   inputs = []

   for i in range(0, 3):

       inputs.append(int(input("Please enter a value: ")))

   return inputs

if __name__ == "__main__":

   print("== First Equation ==")

   first_equation_values = get_three_integers()

   print("== Second Equation ==")

   second_equation_values = get_three_integers()

   solution = brute_force_two_equations(first_equation_values,

                                        second_equation_values)

   if solution:

       print(f"(x, y) {solution}")

   else:

       print("No Solution found")

See more about python atbrainly.com/question/22841107

You took a picture of the beach, and there's a seagull sitting in the sand that you want to remove. What do you use to draw and AUTOMATICALLY remove the seagull, replacing it with more sand?

Answers

Answer: You can use a special type of editor to remove anything you want, and have that place filled in so its not blank space.

BUT: I am not sure of a specific one.

What does Amara hope will
happen when Dad sits on the sofa?

Answers

Amara hope her  Dad will be comfortable using the sofa. Check more about sofa below.

What does sofa implies?

A sofa is known to be a type of long seat that is often made with arms and it also has a back rest. One can convert the sofa to a bed.

Conclusively, when Amara got the sofa for her dad, she hope that her dad will be comfortable using the sofa.

Learn more about sofa from

https://brainly.com/question/14791147

If a company saw an online photo of you playing basketball, it might try to sell
you:
A. music CDs.
B. pet food.
C. high-top sneakers.
O D. a baseball mitt.
ВМІТ

Answers

Answer:

C. high-top sneakers

One of the great advantages of ____ references is that you can quickly generate row and column totals without having to worry about revising the formulas as you copy them to new locations.

Answers

Answer:

relative

Explanation:

Which device is used to direct the flow of data on a computer network?

Answers

Answer:

If you like my answer you can mark it as Brainliest.

Explanation:

A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet.

how do I fix when it hits the second session it skips scanf.
#include <stdio.h>
#include <unistd.h>
#include <ctype.h>
main() {
double first, second;
while(1){
printf(" Calculator\n");
printf("\n 7 8 9 / \n 4 5 6 x \n 1 2 3 - \nEnter operator: ");
char op;
scanf("%c" ,&op); //entering operators such as + - \ *
printf("Enter two operands:");
scanf("%lf %lf", &first, &second); //entering operands such as 1 2 5 8 12 414
switch (op) { // printing the math
case '+'://if its +
printf("%.1lf + %.1lf = %lf\n\n", first, second, first + second);
break;
case '-'://if its -
printf("%.1lf - %.1lf = %lf\n\n", first, second, first - second);
break;
case '*'://if its *
printf("%.1lf * %.1lf = %lf\n\n", first, second, first * second);
break;
case '/'://if its :
printf("%.1lf / %.1lf = %lf\n\n", first, second, first / second);
break;
default://if its not + - / *
printf("error!");
}
}
}

Answers

Answer:

scanf(" %c" ,&op); //entering operators such as + - \ *

Explanation:

put space before %c

What is a search engine ​

Answers

Answer:

A search engine is a software program that helps people find the information they are looking for online using keywords or phrases.

Explanation:

Search engines are able to return results quickly—even with millions of websites online—by scanning the Internet continuously and indexing every page they find.

Which discipline focuses on the design of computer hardware?

information technology

computer engineering

information systems

computer science

Answers

computer engineering

Answer:

Computer Engineering

Explanation:

People that work in the computer engineering field usually create hardware such as the CPU, PSU, RAM, GPU, SSD & a few more.

45 POINTS
PLS HURRY

An issue with the automated collection of personal information is _____. Select 2 options.

it does not yet collect data efficiently
it does not yet collect data efficiently

it processes highly sensitive data
it processes highly sensitive data

that people do not trust it enough
that people do not trust it enough

it may lead to inaccurate decisions
it may lead to inaccurate decisions

it uses robust security solutions
it uses robust security solutions

Answers

Answer:

2 - It processes highly sensetive data

4- it may lead to inaccurate decisions

Explanation:

It processes highly sensitive data and it may lead to inaccurate decisions.

What is automated collection?

The process of automatically collecting and aggregating data or information using computer systems, software, and algorithms without manual intervention is referred to as automated collection.

There are two options:

It handles highly sensitive information.It may result in poor decisions.

Automated personal information collection can process highly sensitive data such as medical records, financial information, or legal documents, which can jeopardise privacy and security if not properly safeguarded.

Furthermore, if the algorithms and models used to analyse the data are biassed or flawed, automated collection may result in incorrect decisions.

Thus, this can have serious ramifications, such as discriminatory outcomes or incorrect medical diagnoses.

For more details regarding automated collection, visit:

https://brainly.com/question/14680064

#SPJ3

What is a federal budget

Answers

6.6 trillion, the federal The United States federal budget comprises the spending and revenues of the U.S. federal government. The budget is the financial representation of the priorities of the government, reflecting historical debates and competing economic philosophies

Write a sub program to find the factors of a supplied number

Answers

Answer:

There are two options I can think of for you,

(Qbasic Code)

To Find the Factors of Given Number:

CLS

INPUT "Enter any number"; n

FOR i = 1 TO n

   x = n MOD i

   IF x = 0 THEN

       PRINT i;

   END IF

NEXT i

END

To Find the Factors of Given Number Using COMMON SHARED:

DECLARE SUB factor ()

COMMON SHARED n

CLS

CALL factor

END

SUB factor

INPUT "Enter any number"; n

FOR i = 1 TO n

   x = n MOD i

   IF x = 0 THEN

       PRINT i;

   END IF

NEXT i

END SUB

how do I upending friend request? 100 POINTS!!!!

Answers

Answer:

If you want to send a friend request, click on their picture. Then scroll down slightly. There should be 3 buttons. The first one says Thank you. The next one is human with a +. Click the 2nd button. That is how to send a friend request.

Explanation:

Have a great day!

#EquestriansLion

lynn wants to share parts of an essay she wrote in her slide presentation

Answers

Answer:

no

Explanation:

No she should not  because it might be for a test

Answer: Use bullet points to summarize the main parts of your essay

Explanation: I took the test myself

Pls help xD. In pseudocode or python code please. Will mark best answer brainliest. Thx

Answers

Answer:

I'm doing my best to send you my answer,

Explanation:

The coding will be below

Shelly uses Fac3book to interact with friends and family online. When is she most likely to express a positive mood on social media?

a.
Sundays
b.
Wednesdays
c.
Fridays
d.
Thursdays

Answers

Answer:

Fridays

Explanation:

On record, Fridays are preffered

The correct option is c. Fridays.

What is Social media?Social media refers to the means of relations among people in which they create, share, and/or interact with information and ideas in virtual societies and networks. In today's civilization, the use of social media has evolved into a necessary daily exercise. Social media is commonly used for social relations and credentials to news and information, and determination making. It is a valuable contact tool with others locally and worldwide, as well as to communicate, create, and spread announcements.

To learn more about Social media, refer to:

https://brainly.com/question/1163631

#SPJ2

2. What are some other reasons why you might need to know the operating system version on your computer or mobile device

Answers

1. To check compatibility of an app/ software
2. To know the vulnerabilities
3. To be aware of available system updates
Hope that helps

To see if an app/software is compatible, to be aware of the flaws and be informed of system updates that are available are the some reasons to know the operating system version on computer or mobile device.

What is operating system?

An operating system is a software program that manages and operates computing device computers, laptops, smart watches, mobile phones.

It is the operating system that makes it unnecessary to know a coding language in order to interact with computers.

Thus, to check compatible, aware of flaws and it keep the updated about the software.

For further details about operating system, click here:

https://brainly.com/question/1763761

#SPJ4

Provide a written response that: describes in general what the identified procedure does and how it contributes to the overall functionality of the program write your response here explains in detailed steps how the algorithm implemented in the identified procedure works. Your explanation must be detailed enough for someone else to recreate it. Write your response here provide a written response that: describes two calls to the selected function. Each call must pass different arguments that cause a different segment of code in the algorithm to execute

Answers

These exercises are about a descriptive essay or a descriptive text. The purpose of a descriptive text is to:

Inform; and guide the reader's precision.

What is a Descriptive Text?

As with every essay or text, your document must have the following:

An introduction (where you state the purpose of the text)The body (where the major description takes place)The conclusion (where you summarize and highlight cautionary instructions).

Usually, it helps to itemize, label, and number instructions.

Examples of Descriptive Texts are:

Standard Operating ManualsCar Manuals.

Learn more about Descriptive Texts at:
https://brainly.com/question/3530147

These activities are about writing a descriptive essay or text. A descriptive text's objective is to, Instruct and direct the precision of the reader.

What is the Definition of Descriptive Text?

The document, like any other essay or literature, must include the following:

a brief overview (where you state the purpose of the text)The body (where the major description takes place)The final word (where you summarize and highlight cautionary instructions).

It is often beneficial to itemize, label, and number instructions. Descriptive texts include the following:

Car Manuals and Standard Operating Procedures

Visit to learn more about Descriptive Texts:

brainly.com/question/3530147

#SPJ4

______________ refers to the practice of ordering extra inventory beyond expected demand to prevent stockouts while the ______________ refers to an inventory management technique where an incoming train unloads materials directly into outbound trucks.

Answers

Safety stock inventory management  refers to the practice of ordering extra inventory beyond expected demand to prevent stockouts.

What is Safety stock inventory?

Safety stock inventory management is known to be a kind of more or extra inventory that is said to have been ordered way above the expected demand.

Note that this technique is often used to stop or hinder any form of stockouts that is said to have been caused by incorrect forecasting or unforeseen events in customer demand.

Learn more about Safety stock inventory form

https://brainly.com/question/26954616

Which of the following is an example of effective nonverbal communication?
O presenting information about the status of a project in a team meeting
O an e-mail congratulating a team for attaining their goal
O eye contact and a smile
Opointing, frowning, and turning away

Answers

Answer:

Eye contact and a smile

Explanation:

There are only two nonverbal communication options in the list you gave:

eye contact and a smilepointing, frowning, and turning away

Pointing, frowning, and turning away would not be effective nonverbal communication because it seems uninviting and disrespectful. Eye contact and a smile is effective nonverbal communication because it shows that you're respectful, paying attention, and understanding.

How do you define a physics material?
A. As an object in the Hierarchy panel
B. All of these will work
C. As a component on a sprite
D. As an Asset that can be linked to a collider on an object

Answers

Answer:

as an object in the hierachy panel

PLEASE HELP! The variable initials is to be assigned a string consisting of the first letter of the string firstName followed by the first letter of the string lastName. Which of the following assigns the correct string to initials ?

Answers

Answer:

a

Explanation:

Prefix function will grab length character(s) from a string while concat function will join 2 strings into 1.

For initials, use prefix on firstName and lastName to grab the first character. Then join the two together using concat to give the initials:

So the answer is a.

The correct choice to the given function is "initials <--- concat (prefix (FirstName, 1), prefix (lastName, 1))", and its explanation as follows:

Prefix function:

To assign the correct string, we must examine the "cancat ()" and "prefix ()" methods in this problem.

The string consists of the first letter of the string "firstName" followed by the first letter of the string "lastName", is to be set to the variable initials.

Please find the attached file for the complete solution.

Find out more bout the prefix function here:

brainly.com/question/14912735

Other Questions
The equation to model Exponential Decay is:y = a[1 r)y= total amounta= starting amountr= the growth rate as a decimalt= number of growth periodsQuestion 1 (1 point)Sarah takes 550 mg of an antibiotic. Every hour,her body breaks down 25% of the remaining drug.How much will be left after 12 hours?Guys help me please I really dont understand this how many molecules are required to produce 15.8 moles of no2 Perform the following operationand express the answer inscientific notation.9.2x10^7 3.7x10^9 Darren's rectangle measures 3 1/4 units by 4 1/3 units. what is its area area = ? ?/? The equation 4x 45 = y is used to find your profit, y, in dollars from buying $45 of supplies and washing cars for $4 each. What does the x stand for? What is the equation of a circle with center (8, 3) and radius 8?(x + 8)2 + (y 3)2 = 64(x 8)2 + (y + 3)2 = 64(x 8)2 + (y + 3)2 = 8(x + 8)2 + (y 3)2 = 8 I need help please. i will give brainliest What is the median of the following numbers? 1, 2, 4, 6, 41,2,4,6,41, comma, 2, comma, 4, comma, 6, comma, 4 how many coats are there on the bed? lol please help im bad at maths ;n; write an expression that is equivalent to 21h - 10h + 16 - 9 + 14h + 5 . In which of instances below would an individual NOT be able to appeal their case in a federal court? A. When a party has lost their case in a U.S. District CourtB. When the decision is handed down by the Supreme Court.C. When a defendant is found guilty by jury in a U.S. District CourtD. When a party had lost their case in U.S. Court of Appeals Select the correct answer. whose belief in civil disobedience did the beats emulate? a. henry david thoreau b. lawrence ferlinghetti c. amiri baraka d. ezra pound type of angle that has the sallest measure Need help with this geometric question ASAP, Thank you 40 POINTS HELPP ME ITS BEEN SO LONG HELP PLEASEEE HELP PLEASEE HELPP Stevie needed twine for the gifts she was wrapping for a family party. The lengths of Stevies twine are shown on the line plot below. How many feet of twine does Stevie have total? I need help!!! Look at the attached file The terminal velocity of a 3 10^-5 raindrop is about 9 m/s. Assuming a drag force Fd = bv, determine (a) the value of the constant b and (b) the time required for such a drop, starting from rest, to reach 63% of terminal velocity. Topic : Heat1. Why can anyone put their fingers beside the flame of a lit candle without getting burned, but not above the flame?2. What is the purpose of putting holes near the top of a metal lampshade?3. A metal spoon is placed in one of two identical cups of hot coffee. Which cup will be cooler after a few minutes? The spanish-american war was known as a (blank) because only 385 americans werekilled in combat - there was actually way more american deaths from disease and rottenfood.o splendid little warspanish-american waryellow journalism waro revolutionary war