1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Daniel [21]
3 years ago
10

A software package developed to handle information requirements for a specific type of business is called a(n) ____. A. outsourc

ed application B. in-house application C. horizontal application D. vertical application
Computers and Technology
1 answer:
kotykmax [81]3 years ago
6 0

Answer:

Option D i.e., ​vertical application.

Explanation:

A vertical application is called a software package formed to manage the data necessary for a particular form of corporation.

A vertical application is an application that assists a particular firm's method as well as aimed a lower amount of persons within a corporation who have particular skill pairs and work duties.

  • Option A is incorrect about the following scenario because It's the method of recruiting the network operator to establish or improve the section of commercial-use apps.
  • Option B is incorrect about the following scenario because It is an application that an entity has built for its inner usage, which is being further popular.
  • Option B is incorrect about the following scenario because it is the opposite of the vertical application.
You might be interested in
What is a computer modem?​
ahrayia [7]

Answer:

A modem modulates and demodulates electrical signals sent through phone lines, coaxial cables, or other types of wiring.

8 0
3 years ago
True or false FAFSA awards work study, but jobspeaker can be used to learn which jobs are available
Kruka [31]

Answer:

true

Explanation:

random because it's FAFSA and that ain't a word

3 0
2 years ago
(a)Ms word is a isa word processing software ,(b)hub provides physical connection between all computers, State true or false​
8090 [49]

Answer:

true

Explanation:

true in answer in the question

8 0
3 years ago
Read 2 more answers
_______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
Sergeu [11.5K]

Answer:

Rootkit.

Explanation:

Rootkit is a collection of software tools,mostly malicious.These are mostly used by hackers to obtain administrator permission to a computer by masking intrusion.

Root-kit is made from two word Root and kit.Where root refers to the name of privileged account on an operating system that is somewhat like unix and KIT refers to the tools used.

6 0
3 years ago
What are you required to verify before allowing a person to operate your pwc?
stich3 [128]

<span>Before allowing a person to operate PWC, check that they meet the minimum age and boater education requirements for PWC. While near shore, show how to start and re board the PWC properly and make sure that he has at least 25 hours of PWC operation experience. Be sure explain how to steer and control the PWC properly.</span>

8 0
3 years ago
Other questions:
  • The tone a writer takes is referred to as the writing _____.
    7·2 answers
  • A digital footprint is all of the information on-line about a person posted by that person or others, ____________. intentionall
    14·1 answer
  • The critical path of a network is the A. shortest time path through the network. B. path with the most activities. C. longest ti
    8·1 answer
  • Data hiding, which means that critical data stored inside the object is protected from code outside the object, is accomplished
    14·2 answers
  • Narrowband Satellite Communications supports ______________ data rates for both mobile and fixed users by providing access on a
    8·1 answer
  • A _____ refers to a product or service, such as a technical report, a training session, a piece of hardware, or a segment of sof
    12·2 answers
  • True or false.local and cloud backup differs in where the backup is saved
    15·2 answers
  • One of the most common encryption protocols in use today. It is an asymmetric protocol that enables the sharing of a secret key
    7·1 answer
  • Write a Python program (rainfall.py) to collect data and calculate the average rainfall over a period of years. The program shou
    11·1 answer
  • Heyyyyyy who likes anime​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!