1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
11

Why security must be planned, tested, and ready by the time the erp implementation is at go-live?

Computers and Technology
1 answer:
irakobra [83]3 years ago
7 0
ERP, the acronym for Enterprise resource planning is an important process by which a company does integrate important aspects of its business such as the planning, purchasing, inventory, sales, etc. Because of this, the security measures should be heightened. 
You might be interested in
Anyone help pls ? Complete the code below to add css to make the background of the web page orange.
pochemuha

Answer:

In HTML file

<body style="background-color:orange;">

Or

In CSS file

body {

background-color: orange;

}

7 0
3 years ago
Pick a web browser (a leading one or perhaps a lesser-known one that you use) and examine the Privacy and Security features and
Veseljchak [2.6K]

Solution :

<u>Chrome web browser</u>

The Chrome web browser uses a range of privacy and security settings for its customers. They include several security indicators as well as malware protection. Chrome uses the sandboxing technology, which prevents the harmful viruses and Trojans from reaching the computers.

Chrome provides a safe browsing by giving us an alert whenever we try to browse some harmful web sites.  It also warns you if we use a username and password combination which has been compromised in any data leak.

Chrome also serves to protect the individuals :

It provides a features of Ad blocking.

When we want to browse safely without being recognized or without storing any credentials, Chrome provides an Incognito mode.

Many businesses can be done on the internet using Chrome platform that is safe and authenticate to gather and collect data and information.

3 0
3 years ago
In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
Natasha_Volkova [10]

Answer:

Caesar cipher

Explanation:

In formation technology, cryptography or cryptology is a process of coding or encrypting information, using algorithms and input values in a network, where there is a present of a third party called adversaries or attackers.

There are different types of cryptography, namely, symmetric, assymmetric and hash cryptography.

Ciphers are algorithms used in cryptography to encode (encrypt) or decode (decrypt) information. An example of cipher is the Ceasar's cipher.

Ceasar cipher is a simple type of substitution cipher that encrpts plain text one character at a time and each coded character depends on the single character and a fixed distance value.

4 0
3 years ago
NOS stands for _____.
Andre45 [30]

there are different ones like

Not Otherwise Specified

Network Operating System

5 0
3 years ago
In 5-10 sentences, describe the purposes, design considerations, and common elements of most brochures.
lozanna [386]
The primary thing to consider when designing a brochure is the target audience. <span> Brochures are meant to capture attention and deliver information, so it's important that the audience will want to read it in the first place.</span> When planning the design, consider the placement of elements and how they are arranged, or the 'white space'. Also take into consideration whether photos will be used. This ensures readability. <span>Also plan for the brochure's color scheme and fonts. These capture the audience so these are core parts of the design.</span>
4 0
3 years ago
Other questions:
  • (Drag each tile to the correct box)While surfing online, Patricia first checks her email and reads the latest messages. She then
    8·1 answer
  • In Linux, the most popular remote access tool is OpenSSH. Which software performs the same remote command line (CLI) access from
    7·1 answer
  • Robin maintains a web page for updating the metro timings in the city. He would like the website to display the present day's sc
    6·1 answer
  • List and briefly defined categories of security services.
    8·1 answer
  • Write a function flush that takes as input a list of five cards, tests whether it is a flush (Note: straight flush is not a flus
    11·1 answer
  • An example of a current disruptive technology is a?
    8·2 answers
  • Write a program that asks the user for two file names. The first file will be opened for input and the second file will be opene
    8·1 answer
  • PLEASE PLEASE PLEASE PLEASE PLEASE HELP! I'M BEGGING Y'ALL! I NEED THIS FOR TODAY! CORRECT ANSWERS WILL BE AWARDED BRAINLIEST!
    6·1 answer
  • Fort Nite is the best u can’t say it’s not
    13·2 answers
  • How many different four-letter combinations for a locker password can you make with the lowercase and uppercase forms of the fir
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!