1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
3 years ago
5

The use of logistics software at DCS (7 points)

Computers and Technology
1 answer:
Charra [1.4K]3 years ago
3 0

Answer:18 th Century

Explanation:

You might be interested in
A business needs to open at the right ___________ and the right ______________. Choose all correct answers.
lisov135 [29]

Answer:

A business needs to open at the right place and the right time.

Explanation:

8 0
3 years ago
A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t
lesantik [10]

Answer:

Malware

Explanation:

It has the following characteristics:

• They are the most common in the network, and the difference with computer viruses is that they do not need user intervention.

• has the characteristic of replicating itself to expand through the networks to which a device is connected.

• When entering a computer, the worm tries to obtain the addresses of other computers through your contact lists, to infect them as well.

• They do not have to manipulate any program or make the computer malfunction, which makes them a little more difficult to detect.

• Take into account that Malware is "malicious software".

 

8 0
4 years ago
What is the differnces between dark and middle ages of computer?​
noname [10]
The "middle ages" are anything between the collapse of Rome (400 AD) to its re-emergence in Rennaissance Italy (1400). Rennaissance means "rebirth". The "dark ages" are the period in the middle ages which were relatively undocumented. This would definitely include 400 AD to 700 AD, and some extend it to 900 AD.
3 0
3 years ago
Which of these is installed only on Apple smartphones and tablets?
melomori [17]
IOS. It's Apple's own custom OS system, built for their tech.
5 0
3 years ago
Read 2 more answers
ZipCar uses cutting edge wireless technology combined with sophisticated data management and security techniques to assure that
Bingel [31]

Answer:

dependable

Explanation:

3 0
2 years ago
Other questions:
  • What types of data are commonly entered into a cell ?
    7·2 answers
  • The salesperson in a cell phone store is telling me that the phone I'm considering has 8GB of memory, which means I can save 10,
    13·1 answer
  • HELP I don't understand this
    14·2 answers
  • Press the _______ key to move to the next cell in a row.
    12·2 answers
  • Given a variable temps that refers to a list, all of whose elements refer to values of type float, representing temperature data
    10·2 answers
  • Question # 6
    11·2 answers
  • Does digital media play a big role in your life?
    13·1 answer
  • Cuáles eran las condiciones de vida de las mujeres durante el renacimiento perduran​
    14·1 answer
  • You and a friend have just started a small business. How could you use the Internet to make your business successful?
    15·2 answers
  • A _____________ delivers all the files that form web pages
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!