1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
3 years ago
6

Burtex Inc. is an application development organization. Twenty five of its knowledgeable employees are retiring in the upcoming

months. Burtex Inc. wants to capture the knowledge of its longtime employees to provide answers to frequently asked questions and save time and effort in training new hires. Identify the technology that would help the organization achieve its goal.
Computers and Technology
1 answer:
viktelen [127]3 years ago
7 0

Answer:

Web 2.0

Explanation:

Web 2.0 describes the changes that occurs in technology and design of website so as to strengthen the sharing of information, cooperation and Web functionality. Most organization adopts Web 2.0 technology such as podcasts and wikis which is used to provide answers to frequently asked questions, determine the knowledge of old-time employees. It also helps to save time and effort required in training new staffs.

You might be interested in
What Is an Antivirus?
wariber [46]
Antivirus software, or anti-virus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name.
8 0
3 years ago
Read 2 more answers
Systems that are used by companies to keep a track of attendance primarily in order to pay their wages.
jolli1 [7]

Answer:

option no.3 Attendance

7 0
3 years ago
Where should citations be included in your research paper? Select all that apply.
yKpoI14uk [10]

Answer:

it would be the first one because it's the header and that's what applies

5 0
3 years ago
You are troubleshooting an issue where a PC can reach some hosts on the Internet (using either DNS name or IP address), while se
wolverine [178]

The options are missing from the question,below are the options to choose from;

A) incorrect (or missing) routes in a routers routing table

B) incorrect DNS configuration on the PC

C) incorrect default gateway configuration on the PC

D) duplicate IP addresses on your LAN

Answer: The correct answer to the question is option A

INCORRECT (OR MISSING) ROUTES IN A ROUTERS ROUTING TABLE.

Explanation: When it is possible for a PC to ping some devices but not actually all,we can then make an assumption that either it has a wrong subnet that is configured or the router from the path to the remote device actually has an incorrect or a missing routes to the device.

5 0
3 years ago
Mary has cleaned her data and is ready to determine the most efficient bus route. She starts by splitting the city into four reg
igomit [66]

ANSWER:

B.

Transforming the data might help Mary notice a different pattern that makes a bigger impact on bus routes than regions of the City.

EXPLANATION:

Mary can check if there are other things or factors that might influence where the bus routes need to be prioritized. For example if the students' age is considered for the bus routes instead of regions. She can achieve this by

By Re-sorting or Transforming the data.

That is to say she will be able to find out if it is only region or if there are different patterns that makes bigger impacts on bus routes, by transforming the data.

8 0
3 years ago
Other questions:
  • Write a C program to calculate monthly payment and print a table of payment schedule for a fixed rate loan.
    7·1 answer
  • Typing a ____________ at the beginning of a word will exclude that word when doing a search.
    8·2 answers
  • 4. When you're working with a word processing document and you press the Del key, what happens?
    8·2 answers
  • This needs to be written in Java.
    11·1 answer
  • Why Embedded operating systems are also known as real-time operating systems (RTOS)?
    15·1 answer
  • What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to acc
    7·1 answer
  • , 13 dB correspond to a power ratio of ....?
    14·1 answer
  • How does the Problem-solving Process help us to solve everyday Problems?
    13·1 answer
  • Write a program that uses two input statements to get two words as input. Then, print the words on one line separated by a space
    11·1 answer
  • What is the theory of relativity? How does it relate to the creation of electricity through solar energy?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!