1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jlenok [28]
3 years ago
11

Which of the following statements is NOT true regarding​ ERP? A. ERP promises​ slow, but​ accurate, information. B. ERP allows c

ompanies share a common database and business practices throughout the enterprise. C. ERP usually provides financial and human resource management information. D. The objective of an ERP system is to coordinate a​ firm's whole business.
Computers and Technology
2 answers:
kkurt [141]3 years ago
7 0

Answer:

A. ERP promises​ slow, but​ accurate information.

Explanation:

Option A. ERP promises slow, but accurate, information is incorrect. One of the most important aspects of Enterprise Resource Planning (ERP) has to do with time optimization through its "Automation" features which aim at cutting down several hours of staff work in performing tedious tasks. Accuracy in information is a must.

Among other important features and capabilities of ERP, it is worth mentioning:

1. Integration

2. Automation

3. Reporting

4. Tracking and Visibility

5. Data Analysis

6. Accounting

7. Customer Relationship Management

Aleks [24]3 years ago
7 0

Hey! How are you? My name is Maria, 19 years old. Yesterday broke up with a guy, looking for casual sex.

Write me here and I will give you my phone number - *pofsex.com*

My nickname - Lovely

You might be interested in
Pick 2 different operating systems and discuss how they can be used in daily operations.
Scilla [17]

Two different Operating Systems are

Windows 7

LINUX

Explanation:

  • Windows is an Operating System which was released by Microsoft to be used on Personal Computers.
  • They are used to manage software and perform various tasks.
  • LINUX is another type of operating system that is used on Super computers
  • Linux has been used in homes and organisation desktops in a great number.
  • It is used for great number of computing embedded tasks.
6 0
3 years ago
4. In Drag and Drop method of Excel , to copy the data , you need to press __________ key while dragging the cells.
alexgriva [62]

Answer:

The <u>control</u> [Ctrl] key

Explanation:

While holding down left click and pressing control key it will copy to where you drag and drop it.

6 0
3 years ago
With the ease of the Internet, it is not uncommon for individuals to copy skills from resume templates to make themselves look m
Butoxors [25]

Answer:

Content.

Explanation:

With the convenience of the Web, copying skills of resumes models is not unusual among people that create themselves seem quite appealing to such a recruiter. Understanding this, Ed developed a check to examine whether that person's job skills are about what's on the form.  

He is checking the validity of the content because It relates to that of the extent that the products on such a survey seem to be extremely determinative of the whole domain to be measured by the study.

7 0
4 years ago
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
kotegsom [21]

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

6 0
3 years ago
Which situation is an example of? "relational context" in the transactional model of? communication?
Jlenok [28]
An example I believe of relational context is when I was out with my son on the weekend (he has a developmental disability) and we had agree I would buy him a 1/2 sub sandwich the day before but then he said I would like a McFlurry so I said okay and then he said so you mean I can have a McFlurry and a sub and I thought oh oh I stuck my foot in it so I said but it must be only a 1/2 sub so he said no I want a full sub then and no mcflurry so I agreed so from the original 1/2 sub idea the idea evolved to a full sub which was affected by the warm sunny summery weather in the afternoon and seeing people lined up at ice cream shops so the idea developed in relation to the weather, how hungry he was and the social aspect people buying ice cream.
8 0
3 years ago
Other questions:
  • If you implement a Wireless LAN (WLAN) to support connectivity for laptops in the Workstation Domain, which domain does WLAN fal
    5·1 answer
  • Nested if-else structures can contain many blocks of code. How many of those blocks of code might be executed?
    14·1 answer
  • Write an expression that computes the average of the values 12 and 40.
    6·1 answer
  • Create the tables and appropriate constraints based on the following ER diagram. Use appropriate data types. Note that the size
    7·1 answer
  • What are ip addresses? why are these important for forensic scientists?
    5·1 answer
  • Why is distance learning better
    12·2 answers
  • Pleasee helpppppppppppppppppppppp me!
    7·1 answer
  • 1. Identify one modern technology and discuss its development and discuss what future changes might occur that could have an eve
    13·1 answer
  • Mha lovers why do other anime lovers report mha lovers for not liking there anime?
    6·2 answers
  • which of the following can be represented by a sequence of bits. 1. An integer 2. An alphanumeric character 3. A machine languag
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!