1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
devlian [24]
3 years ago
13

What are three requirements of information technology a. Accuracyb. _______________________________c. __________________________

_____d. _______________________________2. How much is spent annually on supply chain software?a. $1 billionb. $10 billionc. $100 billion3. Supply chain technology = software a. True b. False4. What activity is creating new demand for RFID technology? a. Store fulfillment of online ordersb. Tracking and delivery of construction materialsc. Hospital patient identification d. Amusement park ticketing5. What will be the next big innovation in supply chain technology?a. Driverless trucksb. Drone deliveryc. In-home 3D printingd. TeleportationLooking Ahead - Episodes 10-12 6.
Computers and Technology
1 answer:
Monica [59]3 years ago
7 0

Answer:

1b. Accessibility  1c. Efficiency  1d. Relevance

2. $10 billion

3. False

4. All of them

5. Drone Delivery

Explanation:

1. Information technology is the study or use of systems (especially computers and telecommunications) for storing, retrieving, and sending information and it must be accurate, accessible, efficient and relevant.

2. Every year about $10 billion is spent on SCM (supply chain management software).

3. supply chain is the network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product, from the delivery of source materials from the supplier to the manufacturer, through to its eventual delivery to the end user while software are just virtual tools use in the day to day activities.

4. Every activity mention is creating a new demand for the radio-frequency identification technology.

5. Drone delivery

You might be interested in
What is a geam in the ggplot2 system?
riadik2000 [5.3K]

Answer:

a) a plotting object like point, line, or other shape

Explanation:

A geom in the ggplot2 system is "a plotting object like point, line, or other shape."

A Geom is used in formulating different layouts, shapes, or forms of a ggplot2 such as bar charts, scatterplots, and line diagrams.

For example some different types of Geom can be represented as geom_bar(), geom_point(), geom_line() etc.

3 0
3 years ago
A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which bene
a_sh-v [17]

Answer:

Redundant paths can be available without causing logical Layer 2 loops.

Explanation:

  • Spanning Tree Protocol is used to allow redundancy in the Layer 2 switched networks without creating cycles/circles also called loops.
  • These loops are called physical loops.
  • When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop.
  • This affects the performance of the network as the result of broadcast packets flooding.
  • STP puts one port of the switch to forward mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to block mode and the one port that is left after this is placed in forward mode.
  • Spanning Tree Algorithm is used by STP to determine the optimal path  of switch to the network.
  • Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.
  • This information helps STP to eliminate the redundant paths.
  • So this is how STP tracks all the links in the switched network and eliminates redundant loops by allowing only one active path to the destination while blocking all other paths.
7 0
3 years ago
Mục đính của thí nghiệm kiểm tra kĩ thuật
KIM [24]
Sorry i need points an i don’t understand✌
6 0
3 years ago
2. Now write a program named filereader.py that reads and displays the data in friends.txt. This program should also determine a
Andrew [12]

Answer:

see explaination

Explanation:

# python code filereader.py

import sys

import readline

from sys import stdin

import random

## Open the file with read only permit

f = open('inputfile.txt')

## Read the first line

sum = 0.0

count = 0

#read file till the file is empty

while True:

line = f.readline()

if ("" == line):

print "Average age of friends is", sum/count

break

list = line.split()

print "My friend ",list[0], " is", list[1]

sum = sum + int(list[1])

count = count + 1

f.close()

'''

inputfile.txt

Denny 24

Penny 28

Lenny 20

Jenny 24

output:

My friend Denny is 24

My friend Penny is 28

My friend Lenny is 20

My friend Jenny is 24

Average age of friends is 24.0

see screenshot at attachment

6 0
3 years ago
What is a main benefit of using Search Audience solutions?a. They identify ad extension opportunities to improve average click-t
uranmaximum [27]

Answer:

Option C is correct.

Explanation:

The biggest advantage of utilizing Search Audience solutions is that they will ultimately deliver the best response to the best client for the appropriate offer. Effective Google Advertising projects continually focus on customer feedback to meet the best possible users through the appropriate advertisement at the appropriate moment.

So, the following are the reason that describes the other options are not appropriate according to the scenario.

6 0
3 years ago
Other questions:
  • Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and s
    6·1 answer
  • In the mouse properties window you can
    6·1 answer
  • You don't have to answer them all, just give me 2 or 3. Thanks
    7·1 answer
  • Hoda needs to create a chart that is associated with an Excel spreadsheet. She needs to ensure that if the data in the spreadshe
    12·1 answer
  • What do you think would have happened if early explorers had not followed their maps, charts, and compasses? (Give 4 examples in
    7·1 answer
  • How to do a Spreadsheet ??
    6·1 answer
  • "Automated Deployment" is one of the prerequisite for DevOps implementation.
    8·1 answer
  • Explain why people struggle to control themselves when they engage with social media
    15·2 answers
  • The software that requests mail delivery from the mail server to an Internet device is known as mail ____ software.
    6·1 answer
  • assume a class named window has an accessor method named getwidth that accepts no parameters and returns an int. assume further
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!