1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IrinaVladis [17]
4 years ago
15

Which example can be considered master data in an organization?

Computers and Technology
1 answer:
Svetradugi [14.3K]4 years ago
3 0
Employee information can be considered master data in an organization
You might be interested in
When your phone sends/receives text messages (specifically using SMS), the total data sent/received contains more than just your
Alexandra [31]

An SMS is a short code that is used by businesses to opt in consumers to their SMS programs, and then used to send text message coupons, offers, promotions to those customers that had previously opted.

Explanation:

When Someone tries to call you, the tower sends your phone a message over the control channel that tells your phone to play its ringtone. The tower gives your phone a pair of voice channel frequencies to use for the call.

The MMS and other data driven services works on the fundamental voice network and is based on the big three GSM, CDMA and TDMA network technologies. The SMS allows text messages of 160 characters (letters, numbers and symbols).

The text messaging is an act of composing and sending electronic messages consist of alphabetic and numeric character between two or more more mobile devices.

7 0
4 years ago
Read 2 more answers
The product of two integers is -180 if one of them is 12 find the other​
astraxan [27]

The answer is -15. This because 12 * 15 = 180 so in order to make it negative one of the integers has to be negative and since 12 is given you have to make 15 negative.

6 0
3 years ago
Taking a suitable example in c language explain the of call by value and call by reference concepts.
Degger [83]

Answer: The difference between call by value and call by reference is that in call by value the actual parameters are passed into the function as arguments whereas in call by reference the address of the variables are sent as parameters.

Explanation:

Some examples are:

call by value

#include <stdio.h>  

void swap(int, int);

int main()

{  int a = 10, b= 20;

 swap(a, b);

 printf("a: %d, b: %d\n", a, b);

}  

void swap(int c, int d)

{

 int t;

 t = c; c = d; d = t;

}  

OUTPUT

a: 10, b: 20

The value of a and b remain unchanged as the values are local

//call by reference

#include <stdio.h>

 void swap(int*, int*);

 int main()

{

 int a = 10, b = 20;

 swap(&a, &b);   //passing the address

 printf("a: %d, b: %d\n", a, b);

}

void swap(int *c, int *d)

{

 int t;

 t = *c; *c = *d; *d = t;

}

OUTPUT

a: 20, b: 10

due to dereferencing by the pointer the value  can be changed which is call by reference

8 0
4 years ago
type the correct answer in the box. Spell all words correctly. Which element of the presentation software can you use to add cal
Anuta_ua [19.1K]

Answer:

The element of the presentation software that can be used to add callous and banners is SHAPES

Using the INSERT TAB, you can add callouts and banners to a slide.

Explanation:

If you want to add callouts and banners to a slide, the presentation software that can be used is PowerPoint.

The element that is used to add it is called shapes and can be found in the Insert Tab.

6 0
3 years ago
Convert (0.255)¹⁰ into binary<br>​
nasty-shy [4]

0.01000001010001111011

Must click thanks and mark brainliest

3 0
3 years ago
Other questions:
  • The process that uses 3D modeling software to create a representation of a three dimensional object is called 3D modeling.
    15·2 answers
  • C2.5 - A group of four pirates has a treasure chest and one unique lock and key for each pirate. Using hardware that is probably
    6·1 answer
  • What is the value of vals[4][1]? double[][] vals = {{1.1, 1.3, 1.5}, {3.1, 3.3, 3.5}, {5.1, 5.3, 5.5}, {7.1, 7.3, 7.5}};
    6·1 answer
  • 1) Open the file DiceSimulation.java attached below. Create a new project on NetBeans called DiceSimulation. Copy the code from
    13·1 answer
  • 1. Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bit memory address
    7·1 answer
  • The Hazard Communication Standard, commonly called the “Right-to-Know” law, gives you the right to know what information?
    6·2 answers
  • When do you need to use a fully qualified url in a hyperlink?
    6·1 answer
  • I’ll mark who ever is first or last Doesn’t matter JUST PLEASE HELP
    8·1 answer
  • What is typescript can you please give me a description of what it is
    13·1 answer
  • A search engine finds bugs and system failures in your computer.<br><br> True or False?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!