1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry [639]
3 years ago
7

Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is

called: a)system software b) application software c) data management software d) network software e) web services software.
Computers and Technology
1 answer:
adoni [48]3 years ago
5 0

Answer:

c) data management software

Explanation:

Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is called data management software.

You might be interested in
Which of the following is NOT AN EXAMPLE of personal identifying
alexgriva [62]

Answer:

Your Social security number .

Explanation:

  • Personal information is the information of. a person.
  • It includes The name,Address,number etc of the person .
  • the PAN,Debit and credit card number is also included .

6 0
3 years ago
Read 2 more answers
Why is the song Twinkle Twinkle Little Star an example of ternary form?
Bogdan [553]

Answer:

p it has a three-part musical form it has a repeating section and a following section this makes and this makes it a ternary form

5 0
3 years ago
Why is the yellow light blinking on the front of my computer
Yanka [14]

Answer:

that means it needs to get charged or it's on airplane mode not sure what else it could be

6 0
3 years ago
Wich type of operating system is usually used in personal computers
Anvisha [2.4K]
The three most common operating systems for personal computers are Microsoft Windows, Apple Mac OS X, and Linux.
4 0
3 years ago
Read 2 more answers
You and your friend who lives far away want to fairly and randomly select which of the two of you will travel to the other’s hom
Phantasy [73]

Answer:

c. your friend can hash all possible options and discover your secret.

Explanation:

SHA-256 is a set of hash functions that was designed by the NSA. SHA-2 is considered an upgrade on the set that was its predecessor, SHA-1. A hash is a mathematical function that condenses data in a process of one-way encryption. SHA-256 creates hash algoritms that are considered irreversible and unique. However, one of the properties of hashing algorithms is determinism, which means that any computer in the world would be able to compute a particular hash and get the same answer.

6 0
3 years ago
Other questions:
  • Regulatory control limits the activities of an organization in compliance with the organization's policies. True False
    14·2 answers
  • Given num_rows and num_cols, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or 3E. Print
    7·1 answer
  • >
    6·1 answer
  • Your friend is working on fixing their Homework assignment. They need a lot of help. You know all the bugs in the file, but due
    12·1 answer
  • What is Software? Write the functions of Software?​
    11·1 answer
  • Every node (except of the last node) in a singly linked list contains ____
    5·1 answer
  • Which wireless communication is typically limited to six feet of distance?
    6·1 answer
  • Write a python program to change variable value of your previous result percentage to your current percentage of mid-term
    13·1 answer
  • The three main objectives of information security are
    5·1 answer
  • When copper wires are bundled together, they are susceptible to ____________, a form of interference where the signals leak out
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!