1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
givi [52]
3 years ago
6

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendor

s and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?
Computers and Technology
1 answer:
puteri [66]3 years ago
8 0

Answer:

Extranet.

Explanation:

As the new boss at his nearby grocery shop, he aims towards develop a rather more effective stock system through encouraging existing retailers and distributors can monitor existing procurement reports as well as change repeat shipping requests to minimize commodity loss.

He using the extranet because it is the same as the internet but it is used by only those members who are signed for that.

You might be interested in
What options are available for storing backups, physically?
RUDIKE [14]

The options are available for storing backups, physically are:

  • In both on site and off site,, a person can backup data to a given system that is located on-site, or the backups can be sent to any  remote system that is off-site.

<h3>What is a backup?</h3>

This is known to be a device that helps to save information or data temporarily or permanently.

Note that in the above, The options are available for storing backups, physically are:

  • In both on site and off site,, a person can backup data to a given system that is located on-site, or the backups can be sent to any  remote system that is off-site.

Learn more about backups from

brainly.com/question/17355457

#SPJ12

7 0
1 year ago
Paragraph: Read the following two e-mail messages. In three to five sentences, explain why E-mail B is the more appropriate work
exis [7]
E-mail B is the more appropriate workplace e-mail because it’s straightforward, polite, and professional. E-mail A was more accusatory and aggressive, and many people don’t like when they’re being yelled at or accused of something and, as a result, this person may start to dislike that coworker. However, the second e-mail was more polite and made the receiver think of them as a respectful person so that they’re happy to help them out.
4 0
3 years ago
The program that solves problem 2 (a) on p.275 should be named as proj4_a.c. It must include and implement the following functio
avanturin [10]

Answer:

#include <iostream>

#include <cstring>

using namespace std;

bool isAPalindrome(char* palindrome);

int main()

{

   char palindrome[30];

   bool palindrome_check;

   cout << "Please enter an word or phrase.\n";

   cin.getline(palindrome, 30);

   palindrome_check = isAPalindrome(palindrome);

   if (palindrome_check = true)

   {

       cout << "Input is a palindrome\n";

   }

   else

   {

       cout << "Inputis not a palindrome\n;";

   }

system("pause");

return 0;

}

bool isAPalindrome(char* palindrome)

{

   char* front;  

   char* rear;  

front = palindrome;// starts at the left side of the c string

rear = (palindrome + strlen(palindrome)) - 1;//starts at the right side of the c-string. adds the c string plus the incriment value of s

while (front <= rear)

{

 if (front = rear)

 {

  front++;

  rear--;

 }

 else

 {

  return false;

 }

}

   return true;

}

7 0
3 years ago
20 examples of input device?
kiruha [24]

Answer:

Computer keyboard,Microphone,Image scanner,Touchscreen,light pen

Explanation:

sorry  that   all  device i  know

8 0
3 years ago
Read 2 more answers
. The _____________ is the responsibility of the CISO, and is designed to reduce incidence of accidental security breaches by or
irinina [24]

Answer: SETA program

Explanation:

 The SETA program is basically stand for the security, education, training and awareness. It is basically used to reduce the accidental security which is break by the organization member such as employees, vendors and contractors.

The SETA program provided various benefits to the organization as it improve the behavior of the employees.It basically enhance the training and education program by focus and concentrate on the information security.

It can also inform he member of the organization about the report of violating many policies.

7 0
3 years ago
Other questions:
  • Why does people that gets abused not report?
    5·1 answer
  • Write a program that reads in text from standard input (hint: use Scanner) and prints out the number of words in the text. For t
    5·1 answer
  • Virtualization:
    8·1 answer
  • HELP FOR JAVASCRIPT: 01. What is prototypical inheritance? 02. How can JavaScript be used to improve accessibility on the web? I
    6·1 answer
  • A business traveler notices there is an extra connector between the keyboard and the computer, in a business center. She has mos
    12·1 answer
  • William is an HR manager in a textile-manufacturing firm. He is creating a file on the hours each employee worked during the las
    6·2 answers
  • List and describe each of the activities of technology
    11·1 answer
  • Pls help I don’t know the answers
    15·1 answer
  • Please answer this question correctly​
    9·1 answer
  • In what way, if any, is the impact of a given risk affected by the timing of a project?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!