the term information technology was first used what year?

Answers

Answer 1

Answer:

1958

Explanation:

The term was first published in the 1958 Harvard Business Review when authors Harold J. Leavitt and Thomas C. Whisler said “the new technology does not yet have a single established name. We shall call it Information Technology.”

Answer 2

Answer:

your answer would be 1985

Explanation:  "The term information technology in its modern sense first appeared in a 1958 article published in the Harvard Business Review; authors Harold J. Leavitt and Thomas L. Whisler commented that "the new technology does not yet have a single established name. We shall call it information technology "


Related Questions

The number represented by 20 hundreds blocks is 2,000. How many thousand
blocks represent the same number?

A 2000) b 20) c 2) d 1)

Answers

Answer:

2

Explanation:

First, divide 2000 by 20.

For your answer, you will get 100.

For the question, it asks that we replace the 100 by 1000.

So, what we will do is 2,000 divided by 1000 and we will get 2.

Therefore, 2 will be our answer.

-kiniwih426

True or false: Most Brainly users are saltier than the ocean. If false, explain why.

Answers

Explanation:

btw I'm not salty........

A(n) __________ structure is a structure that causes a statement or a set of statements to execute repeatedly.

Answers

Answer:

you cant do anything with the start of the question unless you explained more about it

Explanation:

Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse.

Answers

Employee monitoring software is sometimes used in smaller business networks, but it is impractical for use in large business networks due to numerous users and the potential for misuse by these users.

An employee refers to an individual who is employed in a business organization by an employer of labor, so that he or she can perform specific tasks, duties or functions within the business organization while being paid an agreed amount of money as wages.

On a related note, an employee monitoring software can be defined as a software application (program) that is designed and developed for the surveillance of a workplace, in order to gather information about the locations and activities of the employees working in a particular business organization.

However, employee monitoring software are ideal or better suited for smaller business networks, but it is impractical for use in large business networks due to higher number of users and the potential for misuse by these users.

Read more: https://brainly.com/question/23986526

Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems Development Life Cycle (SDLC).

Answers

Answer:

analysis

Explanation:

The Discovery of user requirements, existing system evaluation, and logical system design are part of the analysis phase of the Systems Development Life Cycle (SDLC).

What is the System Development Life cycle?

The systems development life cycle (SDLC) is a project management conceptual model that defines the processes involved in an information system development project, from early feasibility studies to application maintenance. SDLC is applicable to both technical and non-technical systems.

The phase of the system development life cycle whose parts involve the discovery of user requirements, existing system evaluation, and logical system design is the Analysis phase.

Hence, the phase is the Analysis Phase.

Learn more about the System Development Life cycle here:

https://brainly.com/question/28498601

#SPJ2

Instructions
Write a program that uses a while loop to calculate and print the multiples of 3 from 3 to 21. Your program should print each number on a separate
line.
Expected Output
3
6
9
12
15
18
21

Answers

Answer:

num = int(input('1'))

while num < 21:

   num = num * 3

   print(num)

i think this is correct, but i only know some basics to python.

You have a Windows Vista workstation with a built-in network card. The card is intermittently malfunctioning. You install a USB network card and want to permanently disable the internal card to avoid any conflicts. Which administrative tool should you use

Answers

Answer:

Device Manager

Explanation:

try it yourself

press windows key + X

then click device manager

here you can right click anything and disable it

its easy its cake

have fun

Tasks in the ________ phase of the systems development life cycle (SDLC) are to build and test system components, and to convert users to the new system. (1pts) Question 14 - Tasks in the ________ phase of the systems development life cycle (SDLC) are to build and test system components, and to convert users to the new system. system definition component design system maintenance system implementation

Answers

Answer:

system implementation

Explanation:

2) A ________ uses electronic memory and has no motors or moving parts. A) mechanical hard drive B) solid-state drive C) Blu-ray disc D) digital video disc

Answers

Answer:

A.mechanical hard

Explanation:

brainliest me and follow ty

A _________ attack is an attack on a computer system or network that causes a loss of service to users.

Answers

Answer: Denial of Service

Explanation:

the term is self-explanatory

which shortcut keys can be used to duplicate a slide?

Answers

Answer:

Ctrl + D used to duplicate a slide

100 POINTS!!!!!!!!
To safeguard against losses of computer equipment and important information, businesses should train their employees about _____. Select 3 options.

A. not using unknown devices

B. securing unattended equipment

C. avoiding natural disasters

D. monitoring colleagues

E. not using free WiFi

Answers

Answer:

A, B and E

Explanation:

Option A is a correct choice, this is because using an unknown device and connecting it to a network may cause malware to spread on the network or allow a third party unauthorised access to the network.

Option B is also very important because it means that no equipment will be tampered with, keeping it secure is essential.

Option C is not correct as it is simply not possible.

Options D and E are, in my opinion, both correct but I would see how option E is more viable than option D.

Option E is a method hackers use to gain access or data from devices, they do this by making a network that is free and open to everyone and when a device connects, all the data is routed through that network and the person who created it (this is called a man in the middle attack).

Hope this helps!

WORTH 15 POINTS
Yo, Quick question in the movie Into The Woods 2014 version. What character would you want to be in the movie. Give me a good reason too
DUE 11/17/2021 10:00 PM

LOOKING FOR PEOPLE WHO KNOW THE ANSWER.

Answers

Answer:

didnt watch it

Explanation:

i dont watch furry movies

Which of the following is NOT an example of an Information system?
Electrical system
Transaction processing
Expert system
Customer relationship management

Answers

Answer:

Electrical system is not an example of an info system.

The following option which is NOT an example of an Information system is electrical system.

What is information system?

The system of hardware and software that are integrated to form a integrated system. This system allows information to transfer from one user end to another user.

Transaction processing, Expert system and Customer relationship management requires end to end encryption with information sharing. These are the information system except electrical system. The electrical system only supplies electricity to lighten up homes and industries.

Thus, Electrical system is not the information system.

Learn more about information system

https://brainly.com/question/13299592

#SPJ2

You have production infrastructure sitting behind one DNS domain, and for disaster recovery purposes, you have parallel infrastructure on standby behind a second domain hosted in a second AWS region. Which routing policy will automate the switchover in the event of a failure in the production system

Answers

Answer:

Failover

Explanation:

A failover is required when one set of infrastructure fails then traffic is redirected to the second set of backup infrastructure.

Which of the following statements regarding animation in a slide use is true?

Question 3 options:

Animations occur automatically by default


An object can have up to three stacked animatios.


A slide can only have one animation


Animations occur On Click by default

Answers

Answer:

Animations occur automatically by default

During an internship, a client requests that her database application be moved to a separate network drive. What kind of architecture is this an example of

Answers

Since the client requested that her database application be moved to a separate network drive, this an example of: Local network hosted.

In Computers and Technology, cloud computing refers to a type of computing that requires the use of the following shared computing resources over the internet:

Network (web) servers.Computer power.Cloud storage (data storage).  Software programs (applications).

A hosted software can be defined as a software program (application) that is installed, hosted and accessed by end users (clients) entirely from a remote  location, network drive or server.

Read more: https://brainly.com/question/18369405

the web __________ the same thing as the internet.

Answers

it would be the world wide web:) hope this helps!

Give at least five examples of both types of ciphers.? ​

Answers

Answer:

Examples include Porta cipher, Vigenere, Gronsfeld, Beaufort, Autokey, Running key cipher, and even ciphers such as Enigma. Polygraphic Substitution ciphers - groups of characters are replaced. Examples include Hill cipher, playfair, foursquare etc.

Explanation:

follow me please

A ________ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

Answers

Malware
Hope this helps

Answer:

Dictionary Attack

Explanation:

A(n) _____ contains software components that are well documented and have a proven track record of working well together.

Answers

Considering the computer analysis, a Solution stack contains software components that are well documented and have a proven track record of working well together.

What is a Solution Stack?

Generally, a solution stack in computer science is a combination of different applications which function to solve the problem. The problems designed to solve may either be related or unrelated.

Different types of the solution stack

Various types of solution stacks are available in the computing world. Some of the solution stacks are:

Application stackServer stackStorage stackVirtualization stackWeb stack

Hence, in this case, it is concluded that the correct answer is "Solution stack."

Learn more about solution stack here: https://brainly.com/question/13480036

What is the difference between the ISO and the OSI?


The OSI created the ISO.

The ISO created the OSI.

The OSI exists one layer below the ISO.

The ISO exists one layer above the OSI.

Answers

The  difference between the ISO and the OSI is that ISO created the OSI. Option B is correct.

What is the difference between ISO and OSI?

ISO is an abbreviation for the International Organization for Standardization. This is known as an Open System Interconnection (OSI) model, or simply the OSI model.

The ISO-OSI model consists of seven layers. In a comprehensive communication system, it defines seven tiers or levels. ISO is an acronym for International Standards Organization, a multinational organization that works to standardize network communication protocols on a global scale. OSI (Open System Interconnection) is a networking communication paradigm developed by ISO.

The OSI Model includes a distinct layer for Data Link and Physical, but TCP/IP has a single Network Interface layer for both. Similarly, in OSI, there are Application, Presentation, and Session levels, which for TCP/IP are integrated into one layer (Application).

Therefore, option B is correct.

Learn more about ISO, refer to:

https://brainly.com/question/14957302

#SPJ2

true or false computers in a LAN are most likely to be connected using infra red

Answers

Answer: false

Explanation:

Latonya wants to include a website link in her newsletter so readers can click the link and go straight to the website. What kind of formatting does she need to use

Answers

Based on the information given the kind of formatting she need to use is hyperlink.

Hyperlink is link that enables users or readers to go directly to another website or another webpage.

Hyperlink can be included in a website in form of  text or in form of a bookmark which help to lead  user to another page once the user click on the link.

This link can be included in a webpage or newsletter to serve as a reference for user and they are often  underlined or may include "click here".

Inconclusion  the kind of formatting she need to use is hyperlink.

Learn more about hyperlink here:https://brainly.com/question/3027709

large carriers like sprint, at&t, and xo communications exchange internet traffic freely at physical locations called ________.

Answers

The answer is Internet Exchange

Martha pays $3,335 every month for her house payment. She has made 86 payments up till now. How much has Martha paid for her house in all so far?

Answers

Answer:

286810

Explanation:

86*3335=286810

File names should be limited to 144 characters.

true or false

Answers

Answer:

True.

Explanation:

For easier recalling of file names and quicker accessibility...

A cheerful teen willing to help,

who listens to "ROAR,"

stay salty...

Match all the words to its definitions

Please, no links, and answer all of the 7 words to its definition.

Answers

Answer:

Explanation:

from top to bottom

1

2

7

3

4

5

6

question. answer

1.1

2.2

3.7

4.3

5.4

6.5

7.6

What connection method eliminates the need to provide a bank user name and password after the initial setup process

Answers

Based on the internet and networking process, the connection method that eliminates the need to provide a bank user name and password after the initial setup process is known as "OAuth."

This is because OAuth is a type of connection that allows users not to provide their bank username and password after initial setup.

OAuth is a common internet protocol known as an open standard for access delegation.

OAuth is utilized on web applications to allow users to log in without passwords.

Hence, in this case, it is concluded that the correct answer is "OAuth."

Learn more here: https://brainly.com/question/17079128

Which term refers to a very notable exception to the safeness of Bluetooth that was discovered by a security company called Armis and published in late 2017.

Answers

Bluetooth devices are widely used today. BlueBorne refers to a very notable exception to the safeness of Bluetooth that was discovered by a security company called Armis and published in late 2017.

BlueBorne is known to be an airborne attack vector that often makes use of Bluetooth to aid an attacker to breakthrough and take complete control over targeted devices.

The attack often do not need the targeted device to be paired to the attacker's device or even set to discoverable mode

Bluetooth devices are said to be not visible until they are manually set to discoverable mode.

Learn more from

https://brainly.com/question/13718919

Other Questions
Both sides during the Civil War began drafting soldiers into their armies. This practicewould continue for every major war the US would fight until the end of the Vietnam War.What is this practice called? Im not quite understanding this, its just not setting in my brain (Im just now starting in this math class) Anyone who can help me, thank you I appreciate you, a lot! I need part a and b The question has to be worked out and if anyone doesnt care to explain it to me! :) Does DNA control RNA? Identify at least two changes in Robert Billings since he became a member of the wave. Are these positive or negative changes? Why? CluesMy number has two digits.It is not divisible by 5.The first digit is bigger than the second digit.It is not an even number.It is divisible by 3.Its digits add up to 12.The number is(Out of 100) if a region was defined by a shared climate , what would cause it to change? 1. PART A: Which statement identifies the centraltheme of the poem?O A Meals can be a good way to bring familytogether, especially in sad times.B Even when tragedy occurs, it's important to goabout your daily routine.O The quality of your meal is jus s important asthe company.D Food can be a good distraction when tragedyoccurs. Use the problem below to answer the question:34 grams of carbon reacted with an unlimited amount of H20. The reaction is: C + H2O CO + H2The atomic mass of C is 12.01 g/mole. The atomic mass of H2 is 2.016 g/mole. Finish the problem by choosing thecorrect format for dimensional analysis. 1 pointLevi owns 4 acres of farmland. He grows beets on 2/3 of the land. On how many acres of land does Levi grow beets? What would happen if the cell membrane only had 1 layer of phospholipids? In 2019, the supreme court ordered the state of north carolina to redraw gerrymandered voting districts. Which case set a precedent for this order?. What is Cassiuss motivation for sending the messages? Cassius wants to make sure that Brutus is willing to obey his orders. Cassius wants to have Roman citizens read messages about Brutus greatness. Cassius wants to sway Brutus with flattering messages to convince him to help kill Caesar. Cassius wants to alert Brutus about the conspiracy against him. find the slope of the line, given the points (2,1) and (6,3) show all your work. Do not convert into decimal if you have a decimal answer. 2x - 4y = 20 x/3 - y= 3 Solve by using substitution Why was the new railway system in India beneficial for the British?Indians could not ride the railway, so the British had more access to transportation.The railway provided an efficient means to transfer labor to different British industries.The British had a faster and more reliable means for transporting goods and resources.The new railway system created higher wages for Indian workers. 6. What base in DNA pairs with adenine?uracil cytosinethymineguanine *PLEASE ANSWER!!! NEED HELP, ITS FOR MY TEST!!*Which of the following describes a tariff? (1 point)A.) The U.S. pays U.S. producers for every piece of machinery exported to the United Kingdom.B.) The U.S. taxes each piece of machinery imported from the United Kingdom.C.) The U.S. bans imports and exports of machinery to and from the United Kingdom.D.) The U.S. limits the number of imported machinery from the United Kingdom. Marcos has a bank account balance of -$42.30 at the start of the month. After he deposits $16.50, what is his new balance? pls help i will give brainlinest (please explain how to do) After incubation of a set of O/F glucose tubes, the tube without mineral oil turned yellow, while the tube with mineral oil remained green. What does this indicate?