1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RUDIKE [14]
4 years ago
6

_____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.

Computers and Technology
1 answer:
sineoko [7]4 years ago
4 0
Hello <span>Rfieldgrove1102 </span><span>

Answer: EDI enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.


Hope that helps
-Chris</span>
You might be interested in
Choose the word that best completes this sentence. Caught-in and caught-between injuries result from a person being squeezed, ca
loris [4]
I do not know, i really hope you dont fail!!!!!!!!!
8 0
3 years ago
Read 2 more answers
What are 2 ways to send a message to your client when signed in as an accountant user?.
7nadin3 [17]

Answer:

The use of Ask client and request are 2 ways to send a message to your client when signed in as an accountant user.

4 0
2 years ago
Which of the following rules need to be followed when using variables?<br> Choose all that apply.
Masja [62]

Answer:

- All variable names must begin with a letter of the alphabet or an. underscore( _ ).

-After the first initial letter, variable names can also contain letters and numbers.

-Uppercase characters are distinct from lowercase characters.

-You cannot use a C++ keyword as a variable name.

7 0
3 years ago
Read 2 more answers
Help please - designing algorithms
DiKsa [7]

Hi,


Algorithm A takes user input in the form of intiger type and stores values to variables Num1 and Num2. The intigers are later summed into intiger variable Total. Then using the print function you instruct computer to output the content Total variable in an intiger form.


Hope this helps.

r3t40

3 0
3 years ago
The Central Processing Unit carries out the commands from programs running in...
prohojiy [21]

Answer:

the main memory to be precise

5 0
3 years ago
Other questions:
  • The network administrator has configured the enterprise firewall to permit port 21 to allow FTP transfers to occur from outside
    8·1 answer
  • Smoking is a REALLY good example of a choice that can have negative effects on the smoker's health, AND the well-being of others
    9·1 answer
  • g c 24-hour time (also known in the U.S. as military time) is widely used around the world. Time is expressed as hours since mid
    7·1 answer
  • What is the shortest sequence of MIPS instructions that extracts a field for the constant values of bits 7-21 (inclusive) from r
    7·1 answer
  • 2 A_______<br> uses graphics or pictures to help the user navigate and<br> access programs
    14·1 answer
  • List the memory units inside and outside of the CPU, along with short descriptions of their
    11·1 answer
  • RFID tagging is an IoT technology that allows assets to be tracked using electromagnetic fields to automatically identify tagged
    10·1 answer
  • Choose a common cloud-based application from the lesson.(Infrastructure as a service, Software as a service, Platform as a servi
    5·1 answer
  • What is the difference between an html opening tag and a closing tag?.
    7·1 answer
  • Qn 1) Use only Python Programming language for the below question.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!