1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
den301095 [7]
3 years ago
10

What is a fundamental difference between the SAP platform and the AirBnB platform?

Computers and Technology
1 answer:
Minchanka [31]3 years ago
3 0

Answer:

SAP is a marketplace platform and AirBnb is an enterprise resource planning platform. SAP is an enterprise resource planning platform and AirBnb is a collaborative platform

You might be interested in
In programming languages, ____ is used as a mnemonic representation for the program instruction’s memory address.
Alecsey [184]

Answer:

Assembly language

Explanation:

Assembly language writes instructions in human letters. Every machine language instruction has a corresponding assembly language instruction that means exactly the same thing. Assembly language uses a symbolic form of a program which are capable of:

- readable by human beings (+/-)

- constants, addresses, and names of symbolic instructions

- arithmetic during assembly - calculations of addresses, constants

- synthetic instructions (not supported by our assembler)

- expansion of macroinstructions (not supported by our

assembler)

- assembly instructions (pseudo-instructions)

• memory allocation

• memory initialization

• conditional assembly (not supported by our assembler)

3 0
3 years ago
How do I sign into raterhub on my phone and my mobile device at the same time to complete phase 2 of my raters exam for sykeshom
sashaice [31]

Answer:

Explanation:

when you sign up for raterhub, and follow all the due process for registration, in order for you to sign into your mobile phone, you will be given a link or an address that you can enter on your phone. By entering the address, your phone should sign in or should synchronize with the raterhub.

5 0
4 years ago
A low-pass first-order instrument has a time constant of 20ms. Find the frequency,in hertz, of the input at which the output wil
Lubov Fominskaja [6]
A design was operating at a maximum clock frequency of f and the clock had no jitter. if the clock started to have jitter of t secs, what will be the new frequency?
5 0
3 years ago
How do you change your age on here? I accidentally put that i was 15 but i am only 13. How do I change this?
oksano4ka [1.4K]
I honestly don't think they can or just change your account from what I know of I just tried just now to see for you. I think you jus gotta leave it lol. I'm 13 too I lit myself 16
5 0
3 years ago
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
Other questions:
  • In Linux Operating System, what file extension is used forexecutable files?
    6·1 answer
  • Andy, a developer, is designing a new program. Which tool should Andy use to help him complete his task?
    6·1 answer
  • What is virtual memory?
    11·1 answer
  • You suspect that an attacker has hidden files on your machine. What Linux command would you use to search for files with a file
    14·1 answer
  • Who are the best candidates for members of SkillsUSA? Check all that apply. Adolph wants to be an Elementary School Teacher. Rub
    5·2 answers
  • Although implementations vary, reader–writer locks usually block additional readers if a lock is already held in read mode and a
    13·1 answer
  • Raul needs to ensure that when users enter an order into the tblOrders, the shipping date is at least two days after
    9·2 answers
  • Help I will mark BRAINLIEST !<br> Explain looping as an invention strategy. Why is it helpful?
    12·1 answer
  • Difference between multi-national and global company​
    11·2 answers
  • What will happen if storage devices are removed from computer?​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!