1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
3 years ago
14

Whoever helps me with these questions i will help them with the same number of questions in any subject: 1. As the operations ma

nager for a supermarket chain, Mai needs to find a telecommunications technology that: enables managers in remote locations to share documents; keeps track of latest document versions; allows her to create and share new documents. What is Mai doing?
analyzing costs
determining goals
evaluating training
requirements listing options

2. In deciding which technology to use, Harrison considers whether or not his employees will need special training, the availability of technical support, and the installation process. He is analyzing _____.
blacklisting
convenience
lead time
options
Computers and Technology
1 answer:
mezya [45]3 years ago
6 0
I'm going have to go with with 1.b and 2.d hope this helps and I don't need help right now.
You might be interested in
A manufacturing company has several one-off legacy information systems that cannot be migrated to a newer OS due to software com
Digiron [165]

The resiliency technique which would provide the aforementioned capabilities is: D. Full backups.

An operating system (OS) can be defined as a system software which is pre-installed on a computing device, so as to manage or control software application, computer hardware and user processes.

In this scenario, a manufacturing company cannot migrate its several one-off legacy information systems (IS) to a newer operating system (OS), due to software compatibility issues.

Resiliency can be defined as a measure of the ability of a network, server, storage system, computing system or data center, to recover quickly and continue operating when it experience adverse conditions such as:

  • Power failure.
  • Equipment failure.
  • Data loss.

In Computers and Technology, there are four (4) main resiliency technique and these include:

I. Redundancy.

II. RAID 1+5.

III. Virtual machines.

IV. Full backups.

Full backup is a resiliency technique which create backups of the systems for recovery and it allows operating system (OS) patches to be installed on computer systems.

Read more: brainly.com/question/17586013

3 0
3 years ago
Types in java are divided into two categories. the primitive types are boolean, byte, char, short, int, long, float and double.
Rudik [331]
Types in java are divided into two categories. the primitive types are boolean, byte, char, short, not, long, float, and double. all other types are REFERENCE types
4 0
2 years ago
[c++] Write a recursive function takes a word string as input argument and reverse the word. Print out the results of recursive
Aleks04 [339]
I will try to give you the best answer I can possibly come up with. 
The easy way to get it is to store it into an array of strings and print the array of string backwards. You can do that by starting at the last part of the array down to the first letter.
3 0
3 years ago
Jerome falls sick after eating a burger at a restaurant. After a visit to the doctor, he finds out he has a foodborne illness. O
babunello [35]

Answer: food poisning

Explanation:

either the food wasnt

cooked properly or the food was out of date and went bad

3 0
3 years ago
Help 25 points!!!!!!!
Len [333]

Answer:

can u say what the word bank is plz?

Explanation:

3 0
4 years ago
Read 2 more answers
Other questions:
  • Which social networking function came first?
    9·2 answers
  • What method of malware infection installs malware through use of a separate browser window that opens uninvited from a Web page?
    7·2 answers
  • Question 14. (3.04 MC) how does the project manager evaluate the scope of a project
    14·1 answer
  • If a secret key is to be used as a _________ for conventional encryption a single number must be generated.
    13·1 answer
  • How will advertising and communications change as technology improves?????? HELP PLEASE :0 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    12·1 answer
  • Why are high-quality transformers wound with large diameter wire?
    8·1 answer
  • Why is charles babbage known as father of computer?​
    10·1 answer
  • Design 3 classes: Computer - Superclass
    11·1 answer
  • What is the main difference between a peripheral device and other types of devices? Choose the best answer.
    12·1 answer
  • HELPPP
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!