1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudiy27
3 years ago
7

Which statement is true of Web-based electronic data interchange (Open EDI)? a. It consists of international agreements on priva

cy protection and data security. b. It reduces the cost of transmitting documents. c. It provides more secure data transmission than traditional EDI. d. It has a disadvantage of being platform dependent.
Computers and Technology
1 answer:
ale4655 [162]3 years ago
6 0

Answer: (B) It reduces the cost of transmitting documents

Explanation:

 The web based EDI (Electronic data interchange) is one of the simplest technique for transmitting the various types of documents by using the EDI system.

In the web based electronic data exchange, we exchange the file or document by using the web forms in the internet browser.

The main advantage of the web based EDI system is that it reduces the overall cost during the transmission of documents. The EDI system is basically bases on the SAAS (Software as a service) principle and it is widely used in the business.

Therefore, Option (B) is correct.

You might be interested in
Suzy lives alone I. New York where her family lives In Florida
ankoles [38]

Answer:

bro what

Explanation:

3 0
3 years ago
Read 2 more answers
Again, suppose that n and r denote integer values where r > 0 and n ≥ 0. What are two "simple" values, say lowEnough and tooH
enyata [817]

Answer:

Answer explained

Explanation:

From the previous question we know that while searching for n^(1/r) we don't have to look for guesses less than 0 and greater than n. Because for less than 0 it will be an imaginary number and for rth root of a non negative number can never be greater than itself. Hence lowEnough = 0 and tooHigh = n.

we need to find 5th root of 47226. The computation of root is costlier than computing power of a number. Therefore, we will look for a number whose 5th power is 47226. lowEnough = 0 and tooHigh = 47226 + 1. Question that should be asked on each step would be "Is 5th power of number < 47227?" we will stop when we find a number whose 5th power is 47226.

6 0
3 years ago
How many bits does it take to store a 3-minute song using an audio encoding method without compression that samples at the rate
shusha [124]

Answer: a) 51,200 bits.  b) : 10,240 bits.

Explanation:

If we sample a 3 - minute song  at 40,000 samples per second, and we are told that each sample is represented by a combination of 16 bits, we can calculate the number of bits needed to store the song as follows:

N = 40,000 samples /sec . 16 bits /sample. 180 sec,. = 51,200 bits.

Now, if we compress the samples taken, after quantization, in a 5:1 relationship, this means that we will store only 1 of each 5 samples, essentially removing redundant information, so the number of bits needed after compresssion will be 51,200 / 5 = 10,240 bits.

It is interesting to note that if we apply the Sampling Theorem, that says that in order to be recoverable, a signal must be sampled at least two times during the shortest cycle, or at a frequency double than the highest frequency component in the signal, we can see that the signal is sampled at 20 Khz, which is usually the upper audible frequency limit.

3 0
3 years ago
Who want points hehehhheheehhe
valentina_108 [34]

Answer:

yoo pap i :v

p

Explanation:

3 0
4 years ago
Read 2 more answers
A user has just reported that he downloaded a file from a prospective client using IM. The user indicates that the file was call
solniwko [45]

Answer: A) Your user inadvertently downloaded a macro virus using IM

Explanation:

As the user has downloaded a file from a prospective client ad the file was account.doc, but since then the system of the user has not been behaving normally so the most possible reason could have been the user has inadvertently downloaded a micro virus using the IM. These micro virus are invisible programs which can be transferred inadvertently from one user to another another. They can be transported over the network.

Option b is not correct as the user has not download a rootkit as it would require special privileges.

Option c is not correct as the user upon changing a setting in the system can reset it.

Option d is not correct as using the IM is not unstable to the system.

So, the correct option is A.

7 0
3 years ago
Other questions:
  • The first thing to do when your computer gives you a error message is
    7·2 answers
  • Complete the sentence.
    7·1 answer
  • You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you r
    9·1 answer
  • What is the new file system available in windows server 2012?
    9·1 answer
  • Applications of computer 15 fields ​
    9·1 answer
  • Assume you need to declare a type parameter that can represent any type that implements the interface Comparable. Which type par
    15·1 answer
  • A for loop is used to replace a ________ while loop
    6·2 answers
  • Write a method named removeDuplicates that accepts as a parameter a List of integers, and modifies it by removing any duplicates
    7·1 answer
  • Why should you log into your online or mobile app account with the travel charge card vendor?.
    15·1 answer
  • All of the salespeople in hyperactive media sales use laptops, so that they can take their applications and data on the road to
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!