1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Trava [24]
3 years ago
10

A business wants to centralize its administrative tasks. At the same time, it wants the existing systems to manage and sustain t

he growing amount of work in a capable manner. Which technology will help the business meet its goals?
will help the business meet its goals.
Computers and Technology
2 answers:
Lera25 [3.4K]3 years ago
6 0

Answer:

thank you

Explanation:

asambeis [7]3 years ago
5 0

Answer:

personal information management

Explanation:

In other to ensure that required information regarding basic tasks which are required, personal information management helps attain this seamlessly by systematically studying the activities which are being performed in other to or for task such as storing, retrieving, creation. Maintainance and organization of information. With personal information management, tasks are segmented and organized in a tidy and effective manner such that the right, complete and quality information is made available at all times in other to ensure that nothing is missed or lacking.

You might be interested in
What are three recommendations for reducing risk and improving the privacy of your personal information while using social media
viktelen [127]

Answer:

1. Treat the “about me” fields as optional.

2. Become a master of privacy settings.

3. Know the people you friend.

Explanation:

1. Treat the “about me” fields as optional.

Because these fields are offered, however, doesn’t mean you must fill them out. Consider offering a general version of the information requested or simply leaving the field blank. For instance, listing only your state of residence, instead of both city and state, can make it harder for others to figure out exactly where you live.

2. Become a master of privacy settings.

All social media sites give you the option to limit post viewing to specific audiences. Take the time to explore these settings, try different options, and become a master of their use.

3. Know the people you friend.

Once upon a time, social media users competed with one another to have the largest number of connections. Today, however, smart social media users know that the more people you’re connected to, the harder it is to control what happens to the information you post. Make sure you know the people you add on social media, in real life if possible. Don’t hesitate to use the “block” feature when the situation seems to call for it.

6 0
3 years ago
To print a budget:________.
Anika [276]

Answer:

The answer is "Option 2".

Explanation:

In the given question, choice 2 is correct because it uses the print a budget in the Quickbooks is used to form the reports in the center, it also selects the budgets and the forecast value is greater than the value of the budget overview, and the wrong choice can be defined as follows:

  • Choice 1 and Choice 3 both were wrong because it select uses the company and financial value is greater budget value.
  • In choice 4,  It is wrong because it select uses the accountant, and taxes value that is greater budget value.
6 0
3 years ago
Consider the following two tables where EmployeeNum is primary key in both tables. What is the result of combining the two table
oee [108]

Answer:

The result of combining the both tables is:

Employee(EmployeeNum, LastName, FirstName, WageRate, SocSecNum, DepartmentNum, Street, City, State, PostalCode)

Explanation:

Since the EmployeeNum is the primary and it is available in both tables, what happens is that, it will not list the primary key column twice. It will list the primary key first then all the other attribute in the first table followed by the attribute in the second table. And it will take note so as not to repeat attribute that already occur in the first table.

For instance; in this case, besides EmployeeNum, LastName and FirstName also appear in the both tables but only one instance of them were listed in the resulting table.

4 0
3 years ago
Consider the following code segment. How many unique new (do not count the starting process) processes are created? (you may wan
valkas [14]

The number of unique processes that are created is in the original process, you get the PID of the child process. In the child process, you get 0.

<h3>What is a Code Segment?</h3>

This refers to the portion of an object file that is in the virtual space of a computer that contains executable instructions.

Hence, we can note that since PID >= 0, then there would be the creation of two identical processes in which the original process returns the PID of the child process, and the output in the child process would be zero.

If we make use of a canonical tag,

p = fork();\\if (0 == p)

{

   // We're the child process

}

else if (p > 0)

{

   // We're the parent process

}

else

{

   // We're the parent process, but the child couldn't be created

}

Read more about code segments here:

brainly.com/question/25781514

#SPJ1

3 0
2 years ago
____ allows someone browsing the internet to click on words or phrases, enter his or her phone number, and continue browsing
Sphinxa [80]
It is the internet callback technology that allows someone browsing the internet to click on words or phrases, enter his or her phone number, and continue browsing. It is a technology that enable one to browse the Internet to cue on a certain website to have a representative call a certain number.<span />
6 0
3 years ago
Read 2 more answers
Other questions:
  • What are strategies that you can use to yield web sites that are relevant to your research topic?
    13·1 answer
  • Which AWS service is a managed service that makes it easy to set up, operate, and scale a relational database in the cloud?​
    9·1 answer
  • Which of these tools can best be used as a self assessment for career planning purposes
    12·1 answer
  • Web and mobile applications are created for users to only read information. True False
    15·2 answers
  • Select the true statement from the choices below. Group of answer choices Invalid code may cause browsers to render the pages sl
    11·1 answer
  • The degree to which a firewall can impose user access restrictions is known as which of the following?Security assurancePrivileg
    8·1 answer
  • Francis has created a new program. However, Francis used some objects from another program to run methods in the current program
    14·2 answers
  • private members of a class are accessible only from _____________ of the same class or from their friends
    12·1 answer
  • What is another word for: a location in memory that contains a value?
    7·2 answers
  • HELP ASAP IF YOU KNOW PYTHON 2!!!
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!