1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korolek [52]
3 years ago
11

____ is a special type of large, integrated system that ties together all types of a company’s activities, such as planning, man

ufacturing, sales, marketing, distribution, customer service, and finance.
Computers and Technology
2 answers:
Rainbow [258]3 years ago
7 0

Answer:i think is an intranet

Explanation:because that's where they save most of their things

Katyanochek1 [597]3 years ago
6 0

Answer:

ERP or Enterprise Resource Planning

Explanation:

Earlier, each department in an organization used to have its own software system. For example, sales department used to store its information in a database management system like Access.

With the growth in organizations, the need for more sophisticated software system paved the way for large and integrated systems such as ERP, Enterprise Resource Planning. ERP combines the application requirement of all the departments of the organization; data being stored in a centralized database.

ERP is accessible to all the authorized employees and has can be accessed via a web interface. ERP is a collection of integrated applications which solely serves the information needs of all the departments of an organization.

The business requirements such as cash flows, production, purchases, payroll and the like are taken care of by the ERP.

The data of one department is made available to all the other departments.

For example, production capacity is accessible to the purchase department. Based on the purchase history and patterns across the demography and time frames, the organization can modify the production activities accordingly.

This ensures proper planning across the organization and hence, maximizes profits.

ERP, unlike the traditional systems, is much more sophisticated and requires sophisticated hardware and software resources. ERP can be implemented either completely or in steps as needed by the organization.

The central repository provided by the ERP improves the management of information throughout the organization and at the same time, reduces the overheads related with separate information systems for individual departments.

ERP requires one time investment and periodic maintenance to ensure availability and reliability of the system. The financial aspect of ERP can be justified when compared with the benefits available.

However, owing to the centralized nature of the ERP, having a backup and recovery system to combat system failure and other disasters becomes indispensible.

You might be interested in
When an Ethernet NIC has been configured by the OS to use half-duplex, the transmit pair of the twisted-pair cable usestransmiss
zzz [600]

Answer:

C

Explanation:

When an Ethernet NIC has been configured by the OS to use half-duplex, the transmit pair of the cable uses SIMPLEX transmissions, the receive pair in the SIMPLEX transmissions, and the twisted pair cable uses HALF-DUPLEX transmissions.

Cheers

7 0
3 years ago
Do the pros of interpersonal communication via social media outweigh the cons? Explain.
JulijaS [17]
Well in my opinion is that yes they do. The ability to be able to communicate with others so far way really helps society advance towards the future. And i cant stress of how the benefits of being able to share ideas with well anyone is so wonderful.

I hope this helps.
6 0
3 years ago
Read 2 more answers
What type of system security malware allows for access to a computer, program, or service without authorization?
olasank [31]

Answer:

"backdoor" is the correct answer for the above question

Explanation:

  • The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.
  • It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.
  • The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.
7 0
3 years ago
You manage a server that users store their document files on. you are finding that some users are utilizing more space than they
STALIN [3.7K]
You can set soft or hard quotas on file shares per user or per group. This would limit how much space a user can take up.
5 0
3 years ago
Why can't I access my micro SD card on my Lenovo ThinkPad Yoga 11e? I'm trying to export some PNG files onto my Micro SD card, s
BabaBlast [244]

maybe you need a new sd card

6 0
3 years ago
Other questions:
  • Leslie’s form collected a huge amount of data. Over time the employees felt that the applications slowed down. What should lesli
    12·1 answer
  • Kuta software infinite pre- algebra multiplying polynomial and a monomial find product answer key
    14·1 answer
  • A friend is having a problem with keeping a fish tank at the right temperature so the fish stay healthy. Describe how you could
    9·1 answer
  • You are required to design a 4-bit even up-counter using D flip flop by converting combinational circuit to sequential circuit.
    15·1 answer
  • Which piece of computer hardware was revised to run hypervisors natively?
    12·2 answers
  • Design and implement an algorithm that gets a list of k integar values N1, N2,...Nk as well as a special value SUM. Your algorit
    10·1 answer
  • In C++ write a program that prints out PI as a type double and a type float EXACTLY as shown below. Your program should have ONE
    13·1 answer
  • Jamey did a lot of research on his paper topic but can't figure out where to start writing. He has a loose plan in mind, but it'
    9·2 answers
  • Write a C++ program to count even and odd numbers in array. The array size is 50. The array elements will be entered by the user
    13·1 answer
  • Add me on Fortn!te <br> TsarBacon (imma girl)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!