1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedbober [7]
4 years ago
14

______is a multimodal application software platform. the centrealized and shared database system ties the entire organization to

gether, allowing information to be entered once and made available to all users.
Computers and Technology
1 answer:
rodikova [14]4 years ago
7 0

Answer:

Enterprise Resource Planning (ERP) system

Explanation:

The ERP system is an integrated system that mediate an organization processes that include collecting, managing, interpreting business data. The data storage is centralized and the entire organization can share the same business data. The data sharing is usually achieved through a continuously updated view of business data backed by a centralized database management system. This facilitate the information flow between different departments in an organization.

You might be interested in
Aaron is stating the main idea of what he read in his own words. He is _____.
Feliz [49]

Answer:

summarizing

Explanation:

when someone explains in their own words the main idea of a story, it is summarizing.

8 0
3 years ago
Read 2 more answers
Which document does one need to get permission to use a specific location for a project?
musickatia [10]

A document that allows an individual or an organization to use a designated location for a project or other activity is a Permit.

This type of document is also called Location Permit, Protest Permit, Filming Permit, e.t.c. The specific name that is given to such permits can be influenced by the type of project or activity being executed and the agency granting such a license.

In most countries, government agencies, or councils are responsible for accepting, screening and approving, or disapproving applications for such permits.

Application for Project location permits may be denied if the project or activity that has been planned to be executed is unlawful or might constitute a hazard to the human or non-human community in such location.

In some cases, the requirements to be fulfilled besides putting in an application or a location permit, one may be required to pay fees and take up certain insurances.

Learn more about permits at the following link:

brainly.com/question/20417242

6 0
3 years ago
A network administrator enters the command ipv6 router ospf 110 in global configuration mode. What is the result of this command
Zepler [3.9K]

Answer:

The OSPFv3 AS number will be assigned an ID of 110

Explanation:

If we don't have ipv4 addressing previously, we are going to assign the router-id manually.

We are going to receive a message about the assignation manually.

We can assign a router-id with the next line:

#router-id 1.1.1.1

If we already have the ipv4 addressing, the router going to assign the router-id automatically.

4 0
3 years ago
If you are using characters other than whitespaces as delimiters, you will probably want to trim the string before tokenizing; o
Bess [88]
Answer: true


Expiation: because it is important and you must trim the string before tokenizing or you know otherwise
6 0
3 years ago
Read 2 more answers
Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
kakasveta [241]

Answer:

It is called a WPS brutal force attack.

Explanation:

Wired and wireless networks are both susceptible to attacks. The wired network, the advantage as a cable connection, is more secure than wireless networks, but wireless network also have security measures like the wifi protected set up (WPS).

WPS is used to connect to a network without passphrase, but with a key combination or a PIN.

Brutal force attacks are used on WPS to forcefully generate the PIN, using a third party software.

3 0
3 years ago
Other questions:
  • What are tags?
    13·1 answer
  • When you right-click certain areas of the Word or other Office app windows, a command menu will appear. Group of answer choices
    13·1 answer
  • A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in
    9·1 answer
  • Write a statement that declares an int variable named count.
    9·1 answer
  • Do you think robots will take millions of jobs when they're put in different positions such as doctors or taxi drivers?
    7·1 answer
  • Suppose that you have a multiplexer (mux) with 5 different inputs at the following bit-rates: (A) 20 Kbps, (B) 8 Kbps, (C) 12 Kb
    7·1 answer
  • ____________________ parameters are useful in three situations: • When the value of the actual parameter needs to be changed • W
    5·1 answer
  • Can someone help my friend play over-watch she new do it. I can't help her on Friday (p.s she play on Xbox she will get it on Fr
    8·1 answer
  • 1. Define the term Intranet.
    10·1 answer
  • Activity Sheet 2<br>A.Illustrate how to create the object below using draw and modify commands.​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!