Users have roles in all the following aspects of management support systems except ____

a.
Knowledge capture
b.
System maintenance
c.
Usage
d.
Feedback on value


b.
System maintenance

Computer Science & Information Technology

You might also like to view...

The most common hybrid cryptography system is based on the ____ key exchange, which is a method for exchanging private keys using public-key encryption.

A. MAC B. RSA C. DES D. Diffie-Hellman

Computer Science & Information Technology

________ is a password-cracking method wherein the attacker tries all possible passwords, starting with single-character passwords.

A. A hybrid dictionary attack B. A combinatorial attack C. Brute-force guessing D. A dictionary attack

Computer Science & Information Technology

The MLS security model cannot be implemented on top of another base operating system.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A nested decision structure can be used to test more than one condition. 2. A nested decision structure can achieve the same logic as a case structure. 3. The first line of a case structure starts with the word CASE, followed by the test expression. 4. A decision structure will produce unpredictable results if the programmer does not use proper indentation in the pseudocode. 5. An If-Then-Else statement must be used to write a single alternative decision structure.

Computer Science & Information Technology