1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valkas [14]
3 years ago
14

as the new hr manager hired by a company to clean up some of the company's problems,analyse the system requirements for the comp

anys recuiting process and delibrate current opinion on the pros and cons of using an ERP package to improve the overall business process​
Computers and Technology
1 answer:
mojhsa [17]3 years ago
4 0

As new hr manager has his own pros and cons on ERP package for human resources system. For that He or she has to make a checklist.

<u>Explanation:</u>

The human resource manager has purview on ERP package which used in the organization. Since exists, ERP packages been developed by the old human resource manager and requirements may be addressed at that time.

Nowadays in it is a digital world so that the requirement process may be made easy and simple validation. the new human resource manager has to noted and list of pros and cons and contact the IT department and ensure it is addressed.

You might be interested in
How to learning algothrim bett
Stells [14]
The GCSE Computing MOOC (created with Cambridge University Press and Raspberry Pi) can be used either as a course or a flexible teaching resource,
8 0
3 years ago
Pseudocode is an improvement over the IPO chart because it lays out the a0 sequence of steps for a particular program.
katrin2010 [14]

Answer: Pseudocode represents a language like solution

Explanation:

Pseudocode can be defined as one of the informal ways of programming whose description doesn't require any strict programming language syntax or even underlying technological considerations because it's evident that, it's not actually a real programming language . It is used major for an outline/rough draft of a required program. It also summarizes the flow of program, excluding underlying details. Designers usually write pseudocode in order for programmers to fathom the project's requirements of the software and align code appropriately.

5 0
4 years ago
Read 2 more answers
Which type of topology describes the physical arrangement, installation, and connection of cables, computer, and other devices?
Nutka1998 [239]
<span>The network topology describes the physical arrangement, installation, and connection of cables, computer, and other devices.
The network topology can be bus topology (a</span><span> network topology that uses a single cable or conductor to connect all nodes on the network.) ,</span>star topology (a network topology in which cables running from each node connect to a single point, such as a hub.), ring (a network topology that consists of a single cable that runs continuously from node to node), mesh, hybrid, hub topology,... according the arrangement of the nodes. 

8 0
3 years ago
Read 2 more answers
Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that eb
myrzilka [38]

The first step that Ebba should take is: Information gathering and Reconnaissance.

<h3>What is an In-house Penetration Test?</h3>

An in-house Penetration test is a form of offensive test that is aimed at finding the lapses that a system has and initiating attacks to know the best way to prevent them.

Before launching such a test it is advised to plan and gather information about the possible lapses.

This will help the pen tester to know what attacks to launch and the right measures to resolve them. So, the first step that Ebba should take is Information gathering and Reconnaissance.

Learn more about In-house Penetration test here:

brainly.com/question/19085749

3 0
2 years ago
I want to work on cloud computing and i need some help on how to start ?
ddd [48]
A great website that might be able to help is https://www.cybrary.it/

Hope this helps.

6 0
4 years ago
Other questions:
  • Colby has a presentation with steps demonstrating how to make his famous cheesecake. He would like to post this on his new websi
    5·1 answer
  • #We've started a recursive function below called #measure_string that should take in one string parameter, #myStr, and returns i
    5·1 answer
  • Write a complete function called lowestPosition() which takes as array (of double) and the number of elements used in the array
    9·1 answer
  • Clicking this would navigate among different worksheets
    14·1 answer
  • Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices to
    6·1 answer
  • Write a program consisting of: a. A function named right Triangle() that accepts the lengths of two sides of a right triangle as
    9·1 answer
  • A device combined with a switch, router, and wireless access point is called what?
    9·2 answers
  • How to do this question , please answer quickly , I’ll give branliest
    14·1 answer
  • What decides the amount of delay between shots on a digital camera?
    7·1 answer
  • Most operating systems include security features, such as an integrated ____, to protect against unauthorized access via the Int
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!