1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ulleksa [173]
3 years ago
11

The use of digital technology and the Internet to execute the major business processes in the enterprise is called

Computers and Technology
1 answer:
ivanzaharov [21]3 years ago
3 0
Your answer is:
e-business

I hope this helps! :)
You might be interested in
When making an assembly of design what command is most.commonly used?
Schach [20]
There are two common command lines used in creating design assembly. The 'push' and 'pull' command. Both allows you to get parts from the original predelivered content's source desgian    and recreate the design faster and with less memory.
6 0
3 years ago
By default, headers and footers apply to
AleksAgata [21]
Hold up I know he answer
6 0
3 years ago
Annabella was giving a presentation to a group of 20 real estate agents on
podryga [215]

Anticipate questions.

3 0
3 years ago
Read 2 more answers
Which of the following statements is incorrect? An operating system provides an environment for the execution of programs. An op
rosijanka [135]

Answer:

command line and graphical user interface

Explanation:

there were (and still are) operating system with no graphical user interface at all, as for example some Unix releases

8 0
3 years ago
Which type of data purging standard requires seven full passes or rewrites with bit-level erasure software?
hichkok12 [17]

DoD 5220.22-M is the type of data purging standard that requires seven full passes or rewrites with bit-level erasure software.

The “DoD standard,” referring to DoD 5220.22-M, is a term often used in the data sanitization industry. This standard specifies a process overwriting hard drives with patterns of ones and zeros and requires three secure overwriting passes and verification at the end of the final pass.

7 0
3 years ago
Other questions:
  • Can somebody help me with this problem
    10·1 answer
  • True or false. Embedding only part of a font is called presetting.
    14·1 answer
  • Why do astronomers prefer to use the reflecting telescope rather than the refracting telescope to view distant objects in space?
    15·2 answers
  • Excel recognizes an entry as a value if it is a number or it begins with ____
    8·1 answer
  • Disk mirroring is a method of storing data that generates extra bits of data from existing data, allowing the system to create a
    14·1 answer
  • Hurry answerrrrrrr pleaseee
    11·2 answers
  • The results of the SPEC CPU2006 bzip2 benchmark running on an AMD Barcelona has an instruction count of 2.389E12, an execution t
    6·1 answer
  • Choose a common cloud-based application from the lesson.(Infrastructure as a service, Software as a service, Platform as a servi
    5·1 answer
  • Discuss any 4 differences between first and second generation of programming languages <br>​
    11·1 answer
  • We initialize the parameters to all zero values and run the linear perceptron algorithm through these points in a particular ord
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!