1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stells [14]
3 years ago
7

Computer maker Dell realized the problems with keeping large inventories, especially because of the fast rate of obsolescence of

electronics components. Dell now keeps only about two hours of inventory in its factories. The company is most likely using a ________ system.
Computers and Technology
1 answer:
Butoxors [25]3 years ago
6 0

Answer:

what are you asking

Explanation:

You might be interested in
What is the name of the virus that appears to be a legitimate program but when opened
vivado [14]

Answer: trojan horse virus

Explanation:A trojan horse is a non-replicating program that looks legitimate, but it is actually used to perform malicious and illicit activities when launched. Attackers use trojan horses to steal a user's

personal information like password information, or they may simply use it to destroy programs or data on the hard disk.

6 0
3 years ago
All portions, to include subject, title, paragraphs, sub-paragraphs, graphics, tables, charts, and bullet statements, must be pr
Alex17521 [72]

Answer:

True

Explanation:

Portion Markings encompasses a necessary features such as the subject, title, paragraphs, sub-paragraphs, sections, tabs, attachments, the classified signature block, bullets, tables, and even pictures.

Under the current E.O. 13526, the standard markings are required for all documents that contain originally classified information and marking elements listed above.

3 0
3 years ago
Please help me please it's urgent​
il63 [147K]

Answer:

age = input()

if age < 13:

   print("Not allowed")

else:

   print("Allowed")

7 0
3 years ago
Certain files, such as the ____ and Security log in Windows, might lose essential network activity records if power is terminate
Hoochie [10]

Answer:

The answer to this question is a. Event log

Explanation:

Event log in Windows is a comprehensive record of security,system and application notifications stored by the Windows and it is used by administrators to determine problems in the system and foretell issues that going to happen in future.

Operating system and the Apps use event logs to keep account of important software and hardware activity that administrator can use to correct issues with the operating system.

7 0
3 years ago
45 points pls help
Artemon [7]

Answer:

Repetition.

Explanation:

hope it helps u

can u mark me as brainliest

8 0
3 years ago
Read 2 more answers
Other questions:
  • The keyboard, mouse, trackpad, microphone, light pen, and voice recognition are examples of _____ devices.
    5·1 answer
  • New Jersey and New York have the highest state taxes in the United States. They also have high ratios of people moving out compa
    13·1 answer
  • A defensive driver's priority is __<br> A. efficiency<br> B. speed<br> C. handling<br> D. safety
    9·2 answers
  • How do you check how much space is left in current drive?
    9·1 answer
  • Could someone please help?​
    10·1 answer
  • Write a program that converts or calculates values. Use the following guidelines to write your program:
    9·1 answer
  • In terms of technology, wich of the four devices is the most recent?
    7·1 answer
  • Which of the following lines of code would reduce the player’s gold by 100 coins?
    14·1 answer
  • What is the basic body structure of html.
    13·2 answers
  • which is a correct procedural step for a webpage to render on a user's browser? an information request is sent to an ip address
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!