1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nostrana [21]
3 years ago
5

I love the brainly update guys! :)

Computers and Technology
2 answers:
MAXImum [283]3 years ago
8 0

Answer:

yea same

Explanation:

earnstyle [38]3 years ago
3 0

Answer:

you mind if i take these points?

Explanation:

You might be interested in
A(n) ________ collects data from various key business processes and stores the data in a single comprehensive data repository, u
xxTIMURxx [149]

Answer:

An Enterprise System

Explanation:

An enterprise system also refered to as an enterprise software is a computer software application used to handle the needs of a business or an enterprise examples are schools, production companies, government ministries and departments, charities etc.

The software provides all the business oriented services for the enterprise, services such as payment processing, students' information management, automated billing and payments etc.

Because enterprises will typically have different departments, the software is able to collect data from all the key business processes across all the departments into a single database which is useable according to different access privilages by all other parts of the enterprise.

3 0
3 years ago
What is the maximum number of communication paths for a team of twenty people.
Aneli [31]

Answer:

Communication path basically define the path in which the information and messages can be exchange by using the efficient communication path.

There are simple formula for calculating the total number of communication channel that is :

 =\frac{n(n-1)}{2}

Where, n is the number of stack holder.

Now, the maximum number of communication paths for a team of twenty people can be calculated as:

n=20  

=\frac{20(20-1)}{2} = 190

Therefore, 190 is the total number of communication path.

3 0
3 years ago
Which of the following are features of the HTTPS protocol?
gavmur [86]

Answer:

All traffic is encrypted. No one on your network can see what is going on (except for knowing where those packets are going to).

The identity of the remote server can be verified using certificates. So you also know that it really is your bank that you are talking to.

Optionally (and not in wide-spread use), the identity of the client can also be verified using certificates. This would allow for secure login to a site using chip cards instead of (or in addition to) password

8 0
3 years ago
You decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why
Debora [2.8K]

Answer:

Please see attachment for differentiation.

6 0
3 years ago
Suppose that you are asked to modify the Stack class to add a new operation max() that returns the current maximum of the stack
Advocard [28]

Answer:

Following are the code to the given points:

Explanation:

For point 8.1:

public String max()//defining a method max

{

   String maxVal=null;//defining a string variable that holds a value

   for(int x=0;x<n;x++)

   {

       if(maxVal==null || a[i].compareTo(maxVal)>0)//defining if blok to comare the value

       {

           maxVal=a[i];//holding value in maxVal variable

       }

   }

   return maxVal;//return maxVal variable value

}

For point 8.2:

public void push(String item)//defining a method push that accepts item value in a parameter

{

       a[n]=item;//defining an array to hold item value

       if(n==0 || item.compareTo(maxVals[n-1])>0)//use if to comare item value

       {

               maxVals[n]=item;//holding item value in maxVals variable

       }

       else

       {

               maxVals[n]=maxVals[n-1];//decreasing the maxVals value

       }

       n++;//incrementing n value

}

public String pop()//defining a method pop

{

       return a[--n];//use return value

}

public String max()//defining a method max

{

       return maxVals[n-1];//return max value

}

  • In the first point, the max method is declared that compares the string and returns its max value.
  • In the second point, the push, pop, and max method are declared that works with their respective names like insert, remove and find max and after that, they return its value.
7 0
3 years ago
Other questions:
  • What was the first<br> 1:search engine<br> 2:website<br> 3:time the internet started
    6·1 answer
  • What kind of device is a printer? output or input
    13·1 answer
  • A personal computer system is composed of the processing unit, graphics board, and keyboard with reliabilities of 0.976, 0.785,
    8·1 answer
  • Explain why the control bus is not a bus.
    7·1 answer
  • Consider five wireless stations, A, B, C, D, and E.
    13·1 answer
  • 2. Driving above the posted speed limit is _
    13·2 answers
  • What is the final amount stored in value if the computer selects 17 as the
    12·1 answer
  • True or false: The objective of an Enterprise Resource Planning (ERP) system is to create a customized software program that int
    10·1 answer
  • Dash is a collection of sequentially arranged slides put together in the from of a file​
    8·1 answer
  • Key
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!