Answer:
d. To take full advantage of the ERP process, re-engineering will need to occur.
Explanation:
Justification:
ERP Implementation: ERP gives a change in technological ways for managing resources, the way to run the business is remained same but now Ft becomes well planned Diversified P units of Mich do not share common process. and data, generally employ phased-in approach of implementing ERP
• It is the way to overcome from the risk which is with the big bang approach, direct switching
• Perfect implementation of ERP needs re-engineering on the basis of performance
a. maintenance Sometimes ERP which is installed could not support one of the business process. due to lack of research before selecting it
• The statement that the diversified organizations. not. implement ERPs is least accurate because they implement it by employing phased-in approach Therefore, the correct option is d
Answer:
Centralized Processing
Explanation:
Centralized processing was developed to process all of the data in a single computer, and since the first computers were stand-alone with all input and output devices in the same room, only the largest organizations could afford to use centralized processing.
The program does not consists of any syntax error but the module contains error in logic especially while placing the condition inside if statement.
Here we are actually planning to check whether the number passed in the “value” variable is within the given lower and upper range which is passed in second and third parameter.
Solution 1:
if value<=lower AND value>=upper Then
Display “The given number is outside the specified range.”
else
Display “The given number is within the specified range.”
End if
Alternate solution:
So for that the condition needs to be value>=lower and value <=lower. so
if value > lower AND value <upper Then
Display “The given number is within the specified range.”
else
Display “The given number is within the specified range.”
A batholith is an intrusive igneous rock.
Answer: Session Hijacking
Explanation:Session hijacking is the attacking activity that threats the valid session of the computer. This attack also invokes the system with unauthorized access for hacking the information and other processes.
Other options are incorrect because crpto-malware is the ransomware that demands ransom for data encrypted by the hackers, rootkit permits the authorized access in system without getting noticed and logic bomb is a malicious code to harm the program computing. Thus, the correct option is session hijacking.