1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ziro4ka [17]
3 years ago
8

"A software package developed to handle information requirements for a specific type of business is called a horizontal applicat

ion"a. true.b. false.
Computers and Technology
2 answers:
boyakko [2]3 years ago
4 0

Answer:

false.

Explanation:

false.

A horizontal application is defined as any programme that covers a wide number of customers with various sets of skills and expertise. Since application like horizontal types can cover different sectors and can be useful in a number of industries and moreover these application are not area specific or market specific application.

goldfiish [28.3K]3 years ago
3 0

Answer:

<h3>False </h3>

Explanation:

Vertical application software it the software which if build as per the specific requirements for achieving specific processes and functions which are unique to a user or business. These softwares are customised as per the needs of an organisation or enterprise. these applications are useful for organisations operating in marketing, sales, inventory etc but cannot be used by other businesses. They are built to target specific users. ERP(Enterprise Resource Planning ) and CRM (Customer Relationship Management ) are examples of vertical applications.

You might be interested in
The processing power of a computing device is measured by its _____.
Scilla [17]

Answer:

china

Explanation:

8 0
3 years ago
In Microsoft Word you can access the _______ command from the "Mini toolbar". A. insert citation B. save as C. underline D. word
tresset_1 [31]
Save as is the command that you would use to save anything when using microsoft
4 0
3 years ago
Read 2 more answers
While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS serve
tatuchka [14]

Answer:

nslookup ifconfig.

Explanation:

The nslookup is used a number of times by network admins to troubleshoot DNS related problems. In addition, this command finds IP addresses and name servers of hosts. This utility command queries the DNS database tables from every host in a network. It then determines the host name and issues an IP. It sort of converts your domain name into an IP addresses. This command combined with ifconfig finds the correct DNS servers and assigns the correct DNS server IP.

6 0
3 years ago
What system calls have to be executed by a command interpreter? Why is it usually separate from the kernel?
Licemer1 [7]

Answer:

The exec command by interpreter to start new process

Explanation:

On Unix systems, a call to the fork system must be made followed by a call to the e x e c system to begin a new process. The fork call clones the process that is currently running, while the executive call overlays a new process based on a different executable over the calling process.

It is seperate from Kernal because

It Read user commands or a script and execute them, generally turning them into one or more system calls. Is usual It is not part of the kernel since the command interpreter is subject to change.

6 0
3 years ago
Abby has received a request for a data set of actual data for testing a new app that is being developed. She does not want the s
Andreas93 [3]

Q:

Abby has received a request for a data set of actual data for testing a new app that is being developed. She does not want the sensitive elements of the data to be exposed. What technology should she use?

A:

Masking

4 0
2 years ago
Other questions:
  • Which device lets you hear audio on your computer?
    12·2 answers
  • An OR function nested in an IF function results in
    11·1 answer
  • A computer’s memory is composed of 8K words of 32 bits each. How many bits are required for memory addressing if the smallest ad
    10·1 answer
  • HELP ASAP U GET BRAINLIEST
    15·2 answers
  • Which of these expressions is used to check whether num is equal to value?
    13·1 answer
  • Add me on Fortn!te <br> TsarBacon (imma girl)
    11·1 answer
  • It's generally best to use what types of sites for factual internet research? Select all that apply from the choices below.
    5·2 answers
  • The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to a
    13·1 answer
  • suppose a malloc implementation returns 8-byte aligned addresses and uses an explicit free list where the next and previous poin
    6·1 answer
  • The designers of a database typically begin by developing a​ __________ to construct a logical representation of the database be
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!