1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry_Shevchenko [17]
3 years ago
9

Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In one to two sentences,

describe what software Carlos should use.
Computers and Technology
2 answers:
Elanso [62]3 years ago
5 0
He should use Microsoft word to keep track or Microsoft Excell to list prices and stock
dezoksy [38]3 years ago
4 0

Carlos can use Inventory Management systems to monitor inventory levels, deliveries, stock, as well as orders. These systems are able to tell you how likely you are to run out of stock. This will ensure Carlos will not incur stock outages and will ensure that he has enough goods in hand. Inventory Management systems combination of technology will also oversee the monitoring and maintenance of stocked products. Examples of the most common and popular inventory systems Carlos will be in a position to use are Ordoro, Cin7, Listing Mirror, and FinancialForce ERP.

You might be interested in
A student dissolves some solid sodium hydroxide in a beaker of water.
STALIN [3.7K]
C water is the soulute
7 0
3 years ago
Read 2 more answers
The Tab dialog box helps you set tabs in your word processing document. What does this dialog box control the movement of when y
Nata [24]
<span> What does this dialog box control the movement of when you press the tab key?
answer: cursor
but im not 100% sure so sorry if I get you the wrong answer :/ </span>
8 0
3 years ago
Read 2 more answers
Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest
Y_Kistochka [10]

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

3 0
3 years ago
Discuss four uses of computer ​
PtichkaEL [24]

1. It helps to the development of our career.

2. Through the internet, we can know the facts which were happening all over the world

3. Computer can be use as a calculator too

4. We can store any kind of information.

<h3>Hope This Helps You ❤️</h3>
6 0
3 years ago
Read 2 more answers
A firewall can consist of all devices positioned on the network _____________.
ale4655 [162]

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

6 0
4 years ago
Other questions:
  • Whoevr answers this will be marked brainliest
    12·1 answer
  • Why people needs soft skills in the era of high technology.
    13·1 answer
  • Can someone explain a cylinder
    7·1 answer
  • ________ to a base class may be assigned the address of a derived class object.
    8·2 answers
  • Which task is performed by the artificial intelligence programmer?
    7·1 answer
  • DRIVER ED
    13·2 answers
  • In what ways can you sort data by using the sort procedure? Check all that apply.
    6·1 answer
  • QUESTION 9 / 10
    13·1 answer
  • TRUE OR FALSE
    14·1 answer
  • Use a while loop to output the even number from 100 to 147? This is python
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!