1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inessss [21]
4 years ago
14

Which statement is true of electronic data interchange (EDI)? a. It uses proprietary protocols and networks. b. When it uses the

Internet and Web protocols, the cost of transmitting documents increases. c. When Web-based EDI is used, the process of sales forecasting is disrupted. d. It is more beneficial when there are more companies in its network.
Computers and Technology
1 answer:
gogolik [260]4 years ago
3 0

Answer:

d. It is more beneficial when there are more companies in its network

Option D is correct.

You might be interested in
The following program includes fictional sets of the top 10 male and female baby names for the current year. Write a program tha
bazaltina [42]

Answer:

Following are the program in the Python Programming Language.

male_names = {'kay', 'Dev', 'Sam', 'Karan', 'Broly', 'Samuel', 'Jayd', 'Lucifer', 'Amenadiel', 'Anmol'}

female_names = {'Kally', 'Megha', 'Lucy', 'Shally', 'Bailey', 'Jayd', 'Anmol', 'Beth', 'Veronica', 'Sam'}

#initialize the union from male_names and female_names

all_names = male_names.union(female_names)

#Initialize the similar names from male_names and female_names  

neutral_names = male_names.intersection(female_names)

#initialize the symmetric_difference from male_names and female_names

specific_names = male_names.symmetric_difference(female_names)

#print the results

print(sorted(all_names))

print(sorted(neutral_names))

print(sorted(specific_names))

<u>Output</u>:

['Amenadiel', 'Anmol', 'Bailey', 'Beth', 'Broly', 'Dev', 'Jayd', 'Kally', 'Karan', 'Lucifer', 'Lucy', 'Megha', 'Sam', 'Samuel', 'Shally', 'Veronica', 'kay']

['Anmol', 'Jayd', 'Sam']

['Amenadiel', 'Bailey', 'Beth', 'Broly', 'Dev', 'Kally', 'Karan', 'Lucifer', 'Lucy', 'Megha', 'Samuel', 'Shally', 'Veronica','kay']

Explanation:

<u>The following are the description of the program</u>.

  • In the above program, firstly we set two list data type variables 'male_names' and 'female_names' and initialize the male and female names in those variables.
  • Then, we set three variables in which we store union, intersection, and symmetric differences and finally print these three variables in a sorted manner.
4 0
4 years ago
A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
Thepotemich [5.8K]

Answer:

This is what we call SQL Injection.

• SQL Injection is when an attacker compromises your database only if it is vulnerable.

• Vulnerability includes leaving an empty ""(value) or forgetting to close anything that could be attacked.

• Ways to prevent injection is to not use string concatenation.

(<em>ex.</em> "hello" + "world")

*  Use parameterized queries.

*   Immediately get rid of any unused code.

5 0
2 years ago
Technician A says in computer language a 0 or 1 is called a bit. Technician B says in computer language a 0 or 1 is called a byt
pochemuha

Answer:

Technician A is right 0 or 1 is called a bit

Explanation:

In computer language, Binary system is used in which data is shown either as 0 or 1.

A bit can hold either 0 or 1.

A byte can hold 8 bits of information.

Normally we use byte to represent computer storage.

A Kilo Byte (KB) can hold 1,024 bytes of information or 1,024*8 = 8,192 bits

A Mega Byte (MB) can hold 1,024*1,024 =1,048,576 bytes

or 1,048,576*8= 8,388,608 bits

Hence 0 or 1 is called a bit not byte therefore, Technician A is right!

8 0
3 years ago
If you were a game programer (NOT using scratch or other basic software making platforms) what kind of code would you use for th
natulia [17]
8bitworkshop.com. It wouldn’t give you like an undertale thing, but its still super 80s gaming aesthetic
3 0
3 years ago
Read 2 more answers
What threat do insiders with authorized access to information or information systems pose
ki77a [65]

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.

7 0
3 years ago
Other questions:
  • Windows uses a graphical user interface (GUI), which means: a user can carry out commands by clicking, dragging, or otherwise ma
    6·1 answer
  • intext:"The browser feature which enables tabs to work independently from one another so if one crashes, the others may continue
    12·1 answer
  • Fallon is a new student on campus. Everywhere she goes, she is asked for her 12-digit student number. To memorize her new studen
    10·1 answer
  • Sarah needs help with a presentation that she is giving the next day. What are the best ways for her to share her work to get im
    7·2 answers
  • write a program in C# that reads a set of integers and then finds and prints the sum of the even and odd integers?​
    12·1 answer
  • 21
    5·1 answer
  • Unanswered questionl
    12·1 answer
  • A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co
    7·1 answer
  • What are the advantages of using a folder?​
    6·1 answer
  • Select the correct answer.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!