1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
forsale [732]
3 years ago
11

. Business-to-business integration (B2Bi) is vital for efficient and accurate flow of data across internal ISs and external busi

ness partners. B2Bi and secure data exchange over the Internet is done through __________.
a. wireless routers

b. B2B gateways

c. data sources

d. enterprise application integration (EAI) middleware
Computers and Technology
1 answer:
taurus [48]3 years ago
4 0

Answer: b)B2B gateways

Explanation: B2B(Business-to-business) gateway is the part of the information technology business department that provides the service of the connecting the internal resources of business to the external business resources or partners.

Business-to business integration is facilitated by B2B gateways where the information sharing between the in house department process gets connected to vendor platforms .  

Other options are incorrect because wireless routers are for routing the data packets on the network wirelessly,data sources is the hub of all the information acting as source and EAI middleware is used for the integration of the software technology and hardware system.Thus, the correct option is option(b).

You might be interested in
Randy is concerned about his company’s data security on the Internet. Because cellular signals are not encrypted, he is concerne
vovikov84 [41]

Answer:

Randy should deploy SSH to allow the sales department to connect to the company network securely over cellular data signal.

Explanation:

Option A is the correct answer because SSH means Secure Shell. And Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. Any network service can be secured with SSH

Option B is not correct because VPN mean virtual private network. And what VPN does is to extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Option C is not correct because IMEI means International Mobile Equipment Identity and is a number that is use to uniquel identify 3GPP and iDEN mobile phones, as well as some satellite phones.

Option D is not correct because POP3 is an example of email protocol. Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote server to a local email client. POP3 allows you to download email messages on your local computer and read them even when you are offline.

4 0
2 years ago
Where is the "delete account" button in my profile? And please give me a legit answer and not just a word.
N76 [4]

Answer:

in your profile for brainley ??

3 0
2 years ago
Read 2 more answers
is an interviewing method in which a mall interviewer intercepts and directs willing respondents to nearby computers where each
geniusboy [140]

Answer:

computer-assisted self-interviewing

Explanation:

Based on the description of the interviewing method that is being provided, it can be said that this method is known as computer-assisted self-interviewing. Like mentioned in the question this is when interviewees answer the interview questions through a computer screen. This is similar to telephone interviews but it is instead through a computer.

3 0
3 years ago
A campfire is a good source of heat and light on a cool night. The energy that is released when firewood is burned comes from th
Makovka662 [10]
Chemical reactions in the material used to make matches, and the cardboard... so hope this helps :)

NOTE: im not to good at this stuff so i rlllllly hope it helps























































3 0
3 years ago
What is the term for the part of a browser responsible for reading and processing programming languages?
koban [17]
The interpreter is the answer.
4 0
3 years ago
Other questions:
  • What were the first microblogs known as
    12·2 answers
  • How does Hadoop work? It breaks up Big Data into multiple parts so each part can be processed and analyzed at the same time on o
    5·1 answer
  • What type of topology gives you a direct connection between two routers so that there is one communication path?
    14·1 answer
  • You have just finished writing a lengthy research paper and you are ready for formatting. You insert your paragraph headings and
    15·1 answer
  • Why did artists use pinhole cameras during the renaissance?
    8·1 answer
  • Mihaela I. Croitoru – Utilizarea calculatorului personal Microsoft Word dau coroana
    14·1 answer
  • Write a program name Dollars that calculates and displays the conversion of an entered number of dollars into currency denominat
    11·1 answer
  • You need to update both the DEPARTMENT_ID and LOCATION_ID columns in the EMPLOYEES table using one UPDATE statement. Which claus
    5·1 answer
  • 1- pensamiento sistémico<br>2- visión oriental y occidental​
    8·1 answer
  • Create a program that prompts the user for a positive integer then prints a right-aligned pyramid using that number using the st
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!