Different organizations implement different Information Systems base on their core business operations. explain

Answers

Answer 1

Answer:

Different business or firm tend to enforce different Information Systems based completely on their main business operations, in order to best leverage data as an organizations asset. Some of these Information System are as follow:

a) Transaction Processing System (TPS):

A small organization tends to process transactions that might result from day-to-day activities, such as purchase orders, creation of paychecks and thus require using TPS.

b) Management Information System(MIS):

Managers and owners of small organizations tend to incline towards industry-specific MIS, in order to get historical and current operational data, such as inventories data and sales.

c) Decision Support System (DSS):

A DSS to allow managers and owners of small organizations to use predefined report in order to support problem-resolution decisions and operations planning.


Related Questions

The SORT statement is used in the ____________ to place records in a sort work file.

(Points : 2) IDENTIFICATION DIVISION
ENVIRONMENT DIVISION
DATA DIVISION
PROCEDURE DIVISION

Answers

Answer: Procedure division

Explanation:

 The SORT statement is basically used in the procedure division for placing the various records in the sort file. The SORT statement easily accept the records from the different files and then sorting them accordingly to the specific file key in the database.

The SORT statements are used in the procedure division but it does not used in the declarative portion in the sorting file. The SORT statement is basically coded in the form of independent and fixed segment.

In networking, what addressing type is used in sending an email to someone?

A) Broadcast B) Multicast C) Unicast

Answers

Answer: (C) Unicast

Explanation:

 According to the question, if we sending an email to someone individually then, uni-cast addressing type is used. The unit addressing is basically used to represent the single local area network interface.

The unit-cast frame sent only to the specific devices not to the group of the devices. The unitcast basically use between the one source to the one destination.

On the other hand, multicast and broadcast are incorrect because the frame sent to the group of the devices not the specific devices. Therefore, Option (C) is correct.

Answer:

for edge users

a microsoft account

Explanation:

Which of these software packages is not open source software (OSS)? (1 point) (Points : 1.5) Microsoft Windows
Mozilla Firefox Web browser
Apache Web server
a Linux operating system

Answers

Answer:

Microsoft Windows

Explanation:

Open Source Software is a software which is accessible to the public. we can modify or extend the code .In the given options Microsoft windows is not an open source operating system. User don't have access to source code where as Linux is an open source software where you can't limit to the functionality which they provided. you can control and extend the source code which they given for this OS

Suppose that a company offers quantity discounts. If up to​ 1,000 units are​ purchased, the unit price is ​$1010​; if more than​ 1,000 and up to​ 5,000 units are​ purchased, the unit price is ​$9.509.50​; and if more than​ 5,000 units are​ purchased, the unit price is ​$5.505.50. Develop an Excel template using the VLOOKUP function to find the unit price associated with any order quantity and compute the total cost of the order.

Answers

Answer:

Ans. Ready to download, please see the file attached to this document

Explanation:

Note. Consider changing the cell in yellow, does not make sense, it could be 10100 instead of 1010

Hi, to design this sheet, I also used the and(...) function of MS excel, in which you declate that in order to select a certain answer, 2 or more conditions must be true, in our case, if a purchase is up to 1000, the price would be $1010 (consider changing this value, maybe to 10100), if the purchase is more than 1000 and less than 5000, the price is $9,509.50, and if is more than 5000 units, the price would be $5,5005.50.

Please check the formula for further clarifications.

Best of luck.

Final answer:

To calculate unit prices and total cost in Excel with VLOOKUP for quantity discounts, create a lookup table with quantity thresholds and prices, then use the VLOOKUP formula to find the unit price for any order quantity, and multiply this price by the order quantity to find the total cost.

Explanation:

To develop an Excel template that calculates the unit price using quantity discounts with the VLOOKUP function, you'll first need to set up a table with the quantity thresholds and the corresponding unit prices. This table will act as a lookup table for the VLOOKUP function. You will then create a formula that takes an order quantity as input and returns the appropriate unit price based on the quantity thresholds specified.

Here’s an example of how you might structure your table (note that the actual table should be placed in the Excel sheet):

0 units to 1,000 units - $10.10 per unit1,001 units to 5,000 units - $9.50 per unitMore than 5,000 units - $5.50 per unit

To use the VLOOKUP function, you’ll enter a formula like the following in the cell where you want to display the unit price:

=VLOOKUP(order_quantity, lookup_table, 2, TRUE)

After finding the unit price, you can compute the total cost of the order by multiplying the quantity by the unit price derived from the VLOOKUP result:

=order_quantity * unit_price

The if statement regards an expression with the value 0 as __________.

Answers

Answer:

The answer to this question is "false".

Explanation:

In this question, the answer is wrong because in computer science. Except for the binary language, It didn't understand any language. In computer 1 stands for true value and 0 stands for false value. In If-else statement if block executes true value is that is 1. and else block execute false value that is 0. In this question, if the value is 1 then the answer is true. But the answer to this question is false.

Write a program that takes an integer n as a parameter and sums all of the multiples of 2 or 5 from 1 to n. For example, if n = 11, the result would be 2 + 4 + 5 + 6 + 8 + 10 = 35.

Answers

Answer:

// here is code in c++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main() {

// variable

int num;

int tot_sum=0;

cout<<"enter a number: ";

// read the value of n

cin>>num;

// check the multiple of 2 or 5 from 1 to n

for(int x=1;x<=num;x++)

{

// if multiple of 2 or 5 then add them

   if(x%2==0 ||x%5==0)

   {

       tot_sum=tot_sum+x;

   }

}

// print the sum

cout<<"sum of multiple of 2 or 5 is:"<<tot_sum<<endl;

return 0;

}

Explanation:

Read the number "n" from user.Check every number from 1 to n, if it is a multiple of 2 or 5 then add them to "tot_sum".When the for loop end, "tot_sum" will have sum of all the number which are either multiple of 2 or 5.Print the sum.

Output:

enter a number:11

sum of multiple of 2 or 5 is:35

Data aggregates

are used to perform calculations on individual records in a table or query.
cannot be used in a report.
perform calculations on entire columns of data.
return multiple values.

Answers

Answer: Perform calculations on entire columns of data

Explanation:

 Data aggregate is the process that gather the information and express into the form of summary. It basically used in the statistical analysis for calculating the entire column of the data.

The main purpose pf the data aggregate is that it collect more data or information about the specific variable of the given data. The data is basically available in the form of aggregate.

The data aggregate function easily produced the summarized data in the database.

What is a URN (include example)

Answers

Answer: URN(Uniform Resource Name) is the basically a subset of the Uniform Resource identifier(URL). It uses "urn"scheme for the working an implementation. Uniform resource name functions by identifying components uniquely through their name.

The most common example of URN is ISBN (International Standard Book Number)number which helps in the unique searching and identification of book.

Write a C program that displays your name and address (or if you value your privacy, a frictionless name and address)

Answers

Answer:

Following are the program in c language

#include <stdio.h> // header file

int main() // main method

{

   char name[90]="mantasa"; // storing name

   char add[90]="120 lal bangla mumbai"; // storing address

    printf("\n Name:%s\nAddress:%s",name,add); // print name and address

   return 0;

}

Output:

Name:mantasa

Address:120 lal bangla mumba

Explanation:

In this program we are declaring the two array of char type which will store the name and address . after that we display name and address.

Only a third of all Americans have broadband service at home. Among telecommuters, the proportion is 87 percent.

True

False

Answers

Answer:

True.

Explanation:

The statement is true that only a third of all the Americans have broadband service present at their home and this percentage is 87 percent among the telecommuters.

America has made significant progress in the expansion of high -speed internet access in past several years but 19 million american still don't have broadband.

Write a program that inputs the number of hours you are taking this semester and outputs how much time outside of class you should spend studying. (Hint: every 1 credit hour = 2-3 hours spent outside of class).

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variables

   int a,b,c;

   //ask to enter semester hours

   cout<<"Enter the number of hours in the semester:";

   // read the semester hours

  cin>>a;

  //print the semester hours

  cout<<"You have taken "<<a<<" hours in semester."<<endl;

  // find the time spend outside of the class

  b=a*2;

  c=a*3;

  // print the time outside class

  cout<<"you should spend "<<b<<"-"<<c<<" hours outside of class"<<endl;

return 0;

}

Explanation:

Read the hours taken in the semester from user and assign it to "a".

Then find its 2 and 3 time.This will be the time user should spend outside

of the class.

Output:

Enter the number of hours in the semester:15

You have taken 15 hours in semester.

you should spend 30-45 hours outside of class  

If you were looking for the answer to this

A student is studying for a social studies test, and he is also writing a paper and reading a novel for his language arts class. Which statement represents a well-written SMART goal that the student has written for himself for one study session?

Spend time studying for social studies and language arts by the end of the semester.

Spend time today on social studies, and spend time tomorrow on language arts.

Spend one hour reviewing chapter six for social studies, one hour writing the paper, and four hours reading the novel.

Spend 30 minutes reviewing section one of chapter six for social studies, one hour writing an outline for language arts, and 30 minutes reading the novel by 9 p.m. today.

The answer is D :)

Because when you look up this question this one pops up so im posting this so people can find the answer.

Are there any output differences between floats and doubles?

Answers

Explanation:

The precision in double values is twice as compared to float values.Hence double have smaller rounding errors as compared to float variables .A double is of 64 bits and float is of 32 bits usually hence floats have more rounding errors and on more number than doubles.Double has 15 decimal digits of precision and float has only 7 decimal digits for precision.

. Why use parallel processing for data mining?

Answers

Answer:

 Parallel processing is the type of the processing in the computer program instruction by divide into the multiple processors unit. The parallel processing basically allow the interleaved execution the given program together.  

The parallel processing basically uses the multiple element for processing the solution of the problems simultaneously. it basically divide the problem  into independent parts so that the processing of the elements can execute simultaneously.

Its main objective of the parallel processing is that compile and run the program in short duration or time.  

Polymorphism means (Points : 2) many forms
inheritance
driver
many birds

Answers

Answer:

many forms

Explanation:

Polymorphism is a construct in object oriented programming which means multiple forms.For example: Suppose I have a function which performs the add operation on two integers and another function with the same name which concatenates 2 given strings:

int add ( int a, int b);string add ( string a , string b)

The two functions represent polymorphic forms of the add function. The function to be invoked at runtime is determined by the runtime argument type.

For example , add (2,3) will invoke int add ( int a, int b);

Similarly, add("hello","world") will invoke string add ( string a , string b);

. What physical characteristic does a retinal scan biometric device measure?

A. The amount of light reaching the retina

B. The amount of light reflected by the retina

C. The pattern of light receptors at the back of the eye

D. The pattern of blood vessels at the back of the eye.

Answers

Answer: D)The pattern of blood vessels at the back of the eye.

Explanation: The retinal scan is the techniques which is used in the bio-metric mechanism.The scanning of the retina's blood vessel pattern is capture by the scanner is the unique technique which is used for bio-metric purpose.

Blood vessel pattern is capture because it is present in unique form for every person and will help in distinguishing a person from another person while scanning.

Other options are incorrect because light reflection or reaching near retina and light pattern are not the unique way for identification while scanning a person.Thus the correct option is option(D).

Placeholders are used to defend against what kind of hacking attack?

a

SQL Injection

b

Key stroke logging

c

Phishing

d

Denial of Service

Answers

Answer: (A) SQL injection

Explanation:

 Th SQL ( Structured query language) injection is the code injection method or technique that is basically used in data driven attack various applications. The SQL injections are basically used by hackers for attacking on various websites.

The SQL injection are used by the hackers to insert the malicious structured query language statement in the input state for the execution process in the database.  

When we use the SQL injection during that process, the attacker can easily access and modify the database.

_________ Code that you write is called primary code, and code that the compiler produces after processing the primary code is called runtime code

Answers

Answer:

The correct answer for the given question is  "source code"

Explanation:

When you writing a code in any programming language that code is known as  source code.The source code is also known as primary code, when source code is compiles it produce runtime code.

The source code is created by the compiler it can be easily understood by the human being.

for example in c language we write a source code after compilation it produces object code .

Answer:

The correct answer for the given question is  "source code"

Explanation:

When you writing a code in any programming language that code is known as  source code.The source code is also known as primary code, when source code is compiles it produce runtime code.

The source code is created by the compiler it can be easily understood by the human being.

for example in c language we write a source code after compilation it produces object code .

Who developed one of the first mathematical models of a multilevel security computer system?

A. Diffie and Hellman

B. Clark and Wilson

C. Bell and LaPadula

D. Gasser and Lipner

Answers

Answer:

C. Bell and LaPadula

Explanation:

The first mathematical models of multilevel security computer system was developed by Bell and Lapadula. Their full names are David Elliot Bell and Leonard J. Lapadula. Their model used to define the concept of modes of access,secure state machine and outlined the rules of access.

Using for loop . Input an integer and identify whether it's EVEN OR ODD ( without using modulo operator )

using only . C++ programming

Answers

Answer:

Following are the program in c++ language

#include<iostream> // header file

using namespace std; // namespace

int main()  

{

int n1,i; // variable declaration

cout<<"Enter Number: ";

cin>>n1; // input number

for(i=n1;i>1;i=i-2) // check the condition  

{

n1 = n1-2; // decrement the value of number by -2  

}

if(n1==0) // check if it is 0

cout<<"number is EVEN"<<"\n"; // print even

else

cout<<"number is ODD"<<"\n"; // print odd

return 0;

}

Output:

Enter Number: 45

number is ODD

Again run the program

Enter Number:10

number is EVEN

Explanation:

In this program, we input the number by a user in variable n1. After that, we iterate the for loop and initialize the value of a variable" i" in for loop and check the condition.

In each iteration, the variable n1 is decrement by 2 and store it n1.

Finally, check if n1==0 then it print number is EVEN  otherwise it print number is ODD.

.Why is it common practice to use a boot loader?

Answers

Answer:

Bootloader is the program that helps in the revitalizing the micro-controller of the operating system .It makes the operating system self programmable.It's main purpose is loading the tasks or operations to ensure the working interface between software and hardware whenever the system gets booted up.

It is also known as the bootstrap loader.It is necessary and common because it is the first mechanism that works whenever the system gets initialized or booted. Without this feature the reloading of the programs will  not be possible.

. Consider the problem of finding the largest element in a list of n elements. What will be the basic operation of an algorithm to solve this problem?

assignment

addition

looping

comparesn

Answers

Answer:

Comparison.

Explanation:

When we have to find a largest in a list of n elements.First we have to iterate over the list so we can access all the elements of the list in one go.Then to find the largest element in the list we have to initialize a variable outside the loop with the minimum value possible and in the loop compare each element with this value,if the element is greater than the variable assign the element to the variable.Then the loop will find the largest element and it will be the variable.

Which of these is most closely associated with system control? (1 point) (Points : 1.5) boundary
environment
feedback
interface

Answers

Answer:C) Feedback

Explanation: System control is the controlling and managing activity of the system by commands ,regulations, management practices etc.It helps in the analyzation of the system and improving the ability of performing the tasks.Feedback is the component of the control system that is obtained as the output after the controlling  technique is applied in the system.

Other options are incorrect because environment is the surrounding of the system ,interface is the connection between the components of the system and boundary is not a technical term of control system.Thus, the correct option is option(C).

you need to extract data from the system your predecessor created. you discover tables have been created according to the third normal form. you find the needed data in three different tables. what SQL syntax allows you to garner this data?
a. union
b. join
c. Select
d. Having

Answers

Answer:

b. join

Explanation:

Correct answer:

Join: It allow join(paste) two tables by one or more commun columns

Example in the image attached

Bad answer:

Union: it only allow paste two tables with the same structure

select: it only allow get information from 1 table if not use join

having: it only allow get filtered information with a condition

Write a CPP Program to read an integer number. Use a pointer to display this numbe

Answers

Answer:

#include <iostream>

using namespace std;

int main() {

   int n,*p;

   cin>>n;//taking input.

   *p=n;//passing the address of n to pointer.

   cout<<*p<<endl;//printing the number using the dereferncing operator.

return 0;

}

Explanation:

The above written program in in C++.This program takes input of the integer n and stores the address of the integer in the pointer p. For printing the value of the to which the pointer is pointing we need to used the dereferencing  operator * .

Two positive integers are said to be relatively prime if their only common divisor is 1. For example, 8 and 9 are relatively prime, whereas 1 25 and 15 are not (because they have 5 as a common divisor besides 1). Write a function that takes as parameters two positive integers and returns whether they are relatively prime or not. Basic python programming

Answers

Answer:

#code in python.

#function that calulate 2 numbers are relatively prime or not

def fun(x,y):

   while(y):

       x,y=y,x%y

   return x

#user input

a=int(input("enter first number:"))

b=int(input("enter second number:"))

#call the function

if(fun(a,b)==1):

   print(" Both numbers are Relatively prime")

else:

   print("Both numbers are Not relatively prime")

Explanation:

Read two numbers from user.Call the function fun() with parameter "a" & "b". In the function, it will perform Euclid algorithm to find the greatest common divisor.If it is 1 then both are relatively prime else both are not relatively prime.

Output:

enter first number:5

enter second number:125

Both numbers are Not relatively prime

enter first number:8

enter second number:9

Both numbers are relatively prime

.Consider the following sine wave: s(t) = 4sin(2π3t + π)

a.What is the amplitude?

b.What is the frequency?

c.What is the phase?

Answers

Answer:

a. 4

b. 3

c. pi

Explanation:

Generic formula of a sine wave: s(t) = Amp * sin ( 2*pi*freq*t + phase)

where, Amp => Amplitude

freq => frequency

phase => phase

Given sine wave: s(t) = 4sin(2π3t + π)

Comparing it with the generic form , we can identify that :

a. Amplitude : 4

b. Frequency : 3

c. Phase : pi

Amplitude measures peak displacement from origin, Frequency is the number of cycles per second and phase is the relative positioning of the wave with respect to the origin.

Answer:

1) Amplitude = 4

2) Frequency  =[tex]1Hz[/tex]

3) Initial phase = [tex]\pi [/tex]

Explanation:

The general equation of wave is

[tex]y(t)=Asin(\omega t+\phi )[/tex]

where

A is the amplitude of the wave

[tex]\omega [/tex] is the angular frequency of the wave

[tex]\phi [/tex] is the initial phase of the wave

The given wave function is

[tex]s(t)=4sin(2\pi t+\pi )[/tex]

Comparing with the standard function we get

1) Amplitude = 4

2) Frequency  =[tex]\frac{\omega }{2\pi }=\frac{2\pi }{2\pi }=1Hz[/tex]

3) Initial phase = [tex]\pi [/tex]

A cybercrime: Select one: a. Is the act of defaulting on a properly signed agreement entered into upon the internet. b. Can be committed if a computer is the object of a crime, the subject of a crime, or the instrument of a crime. c. Always requires intent to commit a bad act in order to be prosecuted. d. Is synonymous with cyber terrorism

Answers

The answer is B because cyber crime is when a computer is used to commit criminal activities.

Write a C++ program that allows the user to enter double values. Display one of two messages: "The first number you entered is larger", "The second number you entered is larger". Save file as LargerorNot.cpp

Answers

Answer:

Following are the program in c++

#include <iostream> // header file

using namespace std; // namespace

int main() // main function

{

double a,b; // variable declaration

cout<<"Enter the first number and second number : \n";

cin>>a>>b; // input the number

if(a>b) // check first number greater than second number

{

cout<<"The first number you entered is larger";

}

else

{

cout<<"The second number you entered is larger";

}

return 0;

}

Output:

Enter the first number and second number :

45.5

687.8

The second number you entered is larger

Explanation:

In this program we have declared two variable i.e a and b of double type. After that check the condition if(a>b) if this condition is true then display  the message "The first number you entered is larger " otherwise display the message  "The second number you entered is larger".

Create a program that will automatically add the fees and sales tax to a new car.Create a program to find the subtotal andd then total including sales tax. The program should receive a keyboard input representing the vale of the price of the car and the fees as well as the sales tax for the city the car is purchased in. San Francisco, Eurica, Concord California.

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables

double price,fee,tax;

double total;

cout<<"enter the price of car:";

// read the price of car

cin>>price;

cout<<"enter the fee:";

// read the fee

cin>>fee;

cout<<"enter the tax (in %):";

// read the tax

cin>>tax;

a

// total cost

total=price+fee+(price*tax)/100;

// print the cost

cout<<"total cost is: "<<total<<endl;

return 0;

}

Explanation:

Read the price of the car from user and assign it to variable "price",read fee and assign it to variable "fee" and tax to variable "tax".Then calculate the total cost of the car by adding the fee and tax of car to the price of car.

Output:

enter the price of car:1000

enter the fee:50

enter the tax (in %):10

total cost is: 1150

Minimizing ____ is key to maintaining a competitive edge: it leaves competitors insufficient time to introduce their own products first. ISs can contribute significantly to this effort.

lead time

market time

production time

tracking time

Answers

Answer: Lead time

Explanation:

 Minimizing the lead time is one of the key to maintain the competitive edge. Lead time is basically defined as the time period between production of the product to the product are get manufactured in the market. It is also known as time to market.

it basically gives competitive edge when the lead time is reduced over the other products with the high lead time.

The main advantage of the lead time is to make reduce the lead time so that the organization can provide the fastest and reliable delivery of products and services.

Other Questions
How do I identify the rate of change on a linear function? When Brett was only six years old, his older sister hid in his closet, then unexpectedly jumped out and scared him when he came into his dark bedroom. Brett is still terrified of the dark even as an adult. Based on principles of classical conditioning, what is Bretts fear of the dark?a. a result of counterconditioningb. an unconditioned responsec. a conditioned responsed. a result of observational learning lim (x^3-8)/(x)x-2 Select the correct answer.What role does the dialogue play in this passage?The detective finished his conversation with Rob and turned to Rob's wife, Nellie."Ms. Reeves," said the detective. "Would you like to add anything to what your husband said about his co-worker Mr. Pack?"Nellie had only met Mr. Pack once, at a Thanksgiving dinner. But she remembered him clearly."Mr. Pack didn't seem like a very cheerful person," said Nellie. "He carried this dark cloud over him. He kept to himself and didn't mingle withanyone. And there was one really odd thing about him. He would talk to himself whenever he thought no one was looking." A. It reveals information about Nellie.B. It reveals the theme of greed and corruption.C. It advances the plot.D. It reveals the character traits of Mr. Pack. What famous fictional Spaniard is known as "The Man of la Mancha?" Catherine is 4 centimeters taller than ally, while Katrina is 5 centimeters shorter than ally. Let t represent ally's height in centimeters. In physics, why would an equation like y=mx+b be plotted as a straight line rather than as a parabola, as is done in math? Two ice skaters, Frank and Mary, are initially facing each other and separated by 2000 m on a smooth frozen lake. Mary begins skating towards Frank at t = 0 s with an acceleration of 0.75 m/s^2. After she reaches a speed of 12 m/s, she continues skating at a constant 12 m/s. Three seconds after Mary begins to skate, Frank starts skating. He accelerates at 1.1 m/s^2 for 9 s and then skates at a constant speed. a) When do the skaters pass each other? b) How far from Marys starting position is the point at which the skaters pass each other? A bicyclist is finishing his repair of a flat tire when a friend rides by with a constant speed of 3.1 m/s . Two seconds later the bicyclist hops on his bike and accelerates at 2.4 m/s^2 until he catches his friend. a) How much time does it take until he catches his friend (after his friend passes him)?Express your answer using two significant figures. Please select the word from the list that best fits the definitionUnderstands how formulas are usedInterpersonalMusicalBody-KinestheticSpatialLinguisticIntrapersonalLogical-Mathematical Consider work being done on a positive test charge by an external force in moving the charge from one location to another. In this case, the potential energy _________ (increases, decreases) and the electric potential _________ (increases, decreases). Dana Corp. owns stock in Seco Corp. For Dana and Seco to qualify for the filing of consolidated returns, at least what percentage of Seco's total voting power and total value of stock must be directly owned by Dana? Fill in the blank with the most appropriate answer: Il est ____ heure de l'aprs-midi.vingt-troistroisquinzeUne The price of a house increased from $400,000 to $500,000 in one year. What is the percent increase? kendra has 120 stickers . 10 stickers fill a page. how many pages can she fill? if one pie is shared equally by 6 people, then each person will getwhat fraction of the pie? Please Help! I don't know where to start with this, please show all work! What is the vertex form of the equation?y = -x^2 + 12x - 4 3. Looking at some pond water under the microscope, you notice an unfamiliar rod-shaped cell about 200 mm long. Knowing that some exceptional bacteria can be asbig as this or even bigger, you wonder whether your cell is a bacterium or aeukaryote. How will you decide? If it is not a eukaryote, how will you discoverwhether it is a bacterium or an archaeon? [20] Mass of sodium + nitrogen +oxygen+ oxygen+ oxygen = How is the development of SaaS related to cloud computing?