1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLga [1]
3 years ago
5

A ___________ is similar to Computer Integrated Manufacturing, but is based much more on standard reusable application software

instead of custom designed software programs. It eliminates the information gap that existed in previous years by providing real time information
Computers and Technology
1 answer:
11111nata11111 [884]3 years ago
5 0

Answer:

Manufacturing execution system

Explanation:

A Manufacturing Execution System is an information system which that is used in monitoring and tracking the process of producing manufactured goods on the factory floor. It is used to ensure that processes regarding manufacturing are completed. Manufacturing Execution System provides infrastructure than Computer Integrated Manufacturing such as using a standard reusable application  software instead of custom designing software programs on a  contract-by-contract basis thereby reducing costs and implementation time.

You might be interested in
Your boss bought a new printer with a USB 3.0 port, and it came with a USB 3.0 cable. Your boss asks you:
postnew [5]

Answer:

Will the printer work when I connect the printer's USB cable into a USB 2.0 port on my computer:

b. Yes, but at the USB 2.0 speed.

Explanation:

  • The option a is not correct as we can use 2.0 port also for this purpose but not only 3.0.
  • The option b is correct as we can use 2.0 USB Port for 3.0 USB but the speed will remain that of 2.0 USB.
  • The option c is incorrect as  because the speed is dependent on the speed of port.
  • The option d is incorrect as because USB can have speed of 2.0 or 3.0 depending upon the port and USB but can't have 1.1 speed.
8 0
3 years ago
Read 2 more answers
Which statement is true about hacking?
V125BC [204]

Answer:

Hackers do so for various reasons, including the challenge of it

Explanation:

I would say it is this. Plz mark brainliest Thanks:)

7 0
3 years ago
Read 2 more answers
Write a Python program string_functions.py that defines several functions. Each function re-implements Python's built-in string
Svetach [21]

Answer:

def length( mystring):

   count = 0

   for i in mystring:

       count += 1

   return count

def reversed( mystring):

   strlist = []

   for i in range(length(mystring)):

       strlist.append(mystring[(length(mystring) - 1) - i])

       txt = "".join(strlist)

   return txt

string = 'Yolanda'

print(reversed(string))

Explanation:

The python module defines two functions 'reversed' and 'length'. The length function counts the number of characters in a string variable while the reversed function reverses the string variable value.

3 0
3 years ago
Make and run a Python program which:
PSYCHO15rus [73]

Answer:

ok

Explanation:

6 0
2 years ago
season is when the weather is not optimal and few tourists of vacation time a shoulder b high c average d low​
cricket20 [7]
Winter is such a season. Travel is lower to colder climate areas such as Canada, but higher to warmer climate areas like Columbia.
7 0
3 years ago
Read 2 more answers
Other questions:
  • What type of data visual would you use to illustrate trends over time? Gantt chart Bar graph Line chart Scatter diagrams
    5·1 answer
  • Without protocols the information sent and received through the Internet would never reach its intended target and even if it di
    6·1 answer
  • You are asked to design a system of FP numbers representation (with your own design choices), labeled Custom_FP_48, for which we
    8·1 answer
  • Which of the following code segments could be used to skip the first two characters of an input line (they may or may not be whi
    13·1 answer
  • Define the function max2 that takes two integers as arguments and returns the largest of them. Then define the function max_list t
    11·1 answer
  • From Blown to Bits why is it important to know what children are doing on the Web Tonight?
    7·1 answer
  • me pueden ayudar con mi trabajo sii porfss si me dan la respuesta correcta y les doy la mejor coronita si​
    12·1 answer
  • If a file you are opening for appending does not exist, the operating system will detect the missing file and terminate the oper
    14·1 answer
  • Worksheet Identify the devices for moving the cursor around your computer screen
    12·1 answer
  • When the CPU performs the work described in the commands,
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!