1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fenix001 [56]
3 years ago
5

The use of logistics software at DCS (7 points)

Computers and Technology
1 answer:
Charra [1.4K]3 years ago
3 0

Answer:18 th Century

Explanation:

You might be interested in
2.
inn [45]

Answer:

True

Explanation:

Readability is how easy it is to read words, phrases, blocks of copy such as a book, a web page or an article. Legibility is a measure of how easy it is to distinguish one letter from another in a particular typeface.

Your welcome

5 0
3 years ago
Before a story can be published, it goes to ralph. ralph reads the story and may make changes based on spelling or the rules of
Nezavi [6.7K]
I believe Ralph is a editor or a reviser
3 0
3 years ago
Read 2 more answers
14. What significant contribution did Gutenberg make to the printing process?
mart [117]
The correct option is B.
Movable type is a system and technology of printing which uses movable components to reproduce the elements of a document on a paper. Metal movable type printing press was created by Guternberg in Europe in 1450. He was the first one to create this and he used the alloy of lead, tin and antimony in his production.
7 0
3 years ago
Read 2 more answers
What are the advantages of technology ​
mel-nik [20]

Save Lives

Explanation:

ICU and other life savung machines run with technology for example MRI scans would not exist wirhout technology.

5 0
4 years ago
You work as the IT security administrator for a small corporate network. You have designed the physical security of the offices
ladessa [460]

The security IT administrator he or she is planning to install smart card communications over the network which is can be access through TCP IP address.

Smart card key reader to be placed or installed where is required  such as an opening door  or entrance of office or organization extra.

Key card readers should be contactless and record more volume of data and it should synchized with the system at regular intervals.

By Installing smart card and it readers unauthorized  person entry to lab or network server can be avoided. Since smart card reader connected to the network, IT SECURITY administrator can generate log reports.

5 0
3 years ago
Other questions:
  • Which type of architecture places a firewall in front of the VPN to protect it from Internet-based attacks as well as behind a f
    6·1 answer
  • Decrypt the message OPEHHISTLWILKWPR which is the cyphertext produced by encrypting a plaintext message using the transposition
    14·1 answer
  • A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. zombie
    15·1 answer
  • A construction company has an online system that tracks all of the status and progress of their projects. The system is hosted i
    10·1 answer
  • How to import any csv from internet in phyton 3 and R ?
    12·1 answer
  • Sheila is using a process of saving files to her desktop and then renaming them. She is
    13·2 answers
  • RrayList Mystery Consider the following method:
    9·1 answer
  • Select the correct word to complete the sentence
    11·2 answers
  • Which of these stamtemnst correctly descride how to adjust a imange on a slide
    8·1 answer
  • If you schedule a message to be delivered at 6 p.m., but you log out of your computer at 5 p.m., what will happen to the message
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!