Answer:
Option (A) is the correct answer.
Explanation:
A Computer system can be the target for the crime on which a criminal can acquire the information from the computer system which is stored on it. A Criminal is targeting the system with the help of some software that is entered on the computer system through a network.
In the above question, paragraphs are describing the content related to the crime which targets the computer system. This is a concept of a "computer as target". Hence option "A" is the correct answer while the other is not valid because--
- Option b suggests the concept behind the storage device of a computer but in the question, it is about the crime of a computer.
- Option c suggests the concept behind the computer is a criminal but in the question, it is about the crime of a computer.
- Option d suggests the concept behind the communication of a computer but in the question, it is about the crime of a computer.
Answer:
Inventory errors can cause mismatches between the real numbers of the company, to avoid this you must use software that allows you to avoid these errors.
Explanation:
There is <u>software that line</u> (in the cloud), which is not necessary to install directly on a laptop or server.
Software examples for optimal inventory management:
1. ERP software in the cloud (it is an enterprise resource planner), it is flexible and low cost.
2. my MANAGEMENT
3. Crol
4. bind ERP (for SMEs)
5. Cloudadmin
6. Multi-commerce (license required).
A trademark is a sign, symbol, name, or short phrase that indicates the source of a product or service.
Answer:
Explanation:
Monitor is an electronic device that retrieves, and processes shows you what is going on in the computer.
Desktop is the first image you see on your screen when the computer is is used for telling the computer what to do.
keyboard
is used for typing documents. Printer is used for putting documents on paper. CD Bay you can insert a CD or Compact Disc. is is box inside and shaped