Answer:
u look se33y yessir
Explanation:
......................................
Answer:
Electronic Data Interchange (EDI)
Explanation:
Electronic Data Interchange
It is the automated interchange of commercial information using a structured format. A process that allows a company to send information to another company electronically rather than on paper. Commercial entities that conduct business electronically are called business partners.
Numerous commercial documents can be exchanged using electronic data interchange, but the two most common are purchase orders and invoices. At a bottom, EDI interchanges the preparation and handling of mail associated with traditional commercial communication. However, the true power of EDI is that it standardizes the information communicated in commercial documents, which makes a "paperless" exchange possible.
Answer:
Two advantages of the agile methods are:
- The agile method require less documentation process as compared to waterfall model and saves maximum time and money. It basically reduces the efforts and the amount of work.
- In agile method, there is always high customer satisfaction present. In agile method, it is easy to modify in the data as compared to the waterfall model. The customers and developers always interact with each other as the interaction is very important for the good results in the project.
Two disadvantages of the agile methods are:
- For the large and complex projects, sometimes it is difficult to determine the requirements in the software development as projects are easily go off track.
- There is less predictability and the projects are easily messed up if the projects requirement are not clear by the customer end.
Answer:
Network Printer
Explanation:
A network printer is a type of printer that is accessible by network connections, making it available for use by other computers connected to that network. The network can either come from the printer or from a local computer provided to create network for the printer. Most of them contains a network interface card that allow them connect directly to a local network from which computers can then access them. This is different from a local printer that is directly connect to the computer via USB cable.
Network printer is very advantageous in that multiple network computers can access the printer at thesame time.
Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.