1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nasty-shy [4]
4 years ago
13

Front office employees at the Melville Lodge use a computer-based system to manage, among other things, the central reservation

system (CRS), room revenue, room rates, room assignments, guest history, and accounting information. This system is referred to as a _____________
Computers and Technology
1 answer:
Step2247 [10]4 years ago
6 0

Answer:

Property Management System

Explanation:

A property management system (PMS) is a software sytem used for the operations of hospitality properties and manufacturing industries sometimes.

You might be interested in
Integrated circuits are made up of _____ and carry an electrical current
Rasek [7]

Answer:

integrated circuits are made up of Transistor and carry an electrical current

4 0
4 years ago
Which letters appear in the home row on a keyboard?
ZanzabumX [31]
C) A, S, D, F, G, H, J, K, L

The home row of keys are the keys which are in the middle of the keyboard. F and J have little bumps on them, which signify that they are the home keys. The home row is also where your fingers are meant to return when not typing.

5 0
3 years ago
Read 2 more answers
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
julia-pushkina [17]

Answer:

Option (A) is the correct answer.

Explanation:

A Computer system can be the target for the crime on which a criminal can acquire the information from the computer system which is stored on it. A Criminal is targeting the system with the help of some software that is entered on the computer system through a network.

In the above question, paragraphs are describing the content related to the crime which targets the computer system. This is a concept of a "computer as target". Hence option "A" is the correct answer while the other is not valid because--

  • Option b suggests the concept behind the storage device of a computer but in the question, it is about the crime of a computer.
  • Option c suggests the concept behind the computer is a criminal but in the question, it is about the crime of a computer.
  • Option d suggests the concept behind the communication of a computer but in the question, it is about the crime of a computer.
4 0
4 years ago
In which of the following mouse operations do you move the mouse until the pointer is positioned on the item of choice?
wolverine [178]
It's a. You have to move to the item thus pointing ;D
8 0
3 years ago
On the 74ls74 d flip-flop, the clk input has a small triangle. the pr (preset) and clr (clear) inputs have a circle. what do the
topjm [15]
The triangle indicates that the clock signal is an edge-triggered signal.
The circle indicates that the signal is low-active (ie., inverted).
The 74LS74 has a positive-edge trigger clock (low to high).
7 0
4 years ago
Other questions:
  • Which sentence best describes an activity stream?
    10·2 answers
  • Because of the limited storage capacity of __________, it is unsafe to talk on a cell phone while driving on a freeway during ru
    7·1 answer
  • In this mode, your presentation will fill up the entire screen. Auto Default Standard Window
    6·2 answers
  • Give three facts about the history of the train shongololo
    9·1 answer
  • What computing platform was designed to help a beginner create interactive objects that receive input from sensors and use that
    11·1 answer
  • Why do the Brainly ads not end even after the timer reaches 0? Sometimes the Done Button does not appear.
    5·2 answers
  • A(n) _____ is a network connection device that can build tables that identify addresses on each network.
    10·1 answer
  • Which statement is most likely to be true about a computer network?
    12·2 answers
  • Differentiate between off the shelf software and bespoke software
    11·1 answer
  • When a number gets assigned to a variable that already has a value __________. the new number overwrites the previous value at t
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!