1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tema [17]
2 years ago
9

The EDI ____________layer describes the business application that i

Computers and Technology
1 answer:
suter [353]2 years ago
6 0

Answer:

a) EDI Semantic Layer

Explanation:

EDI is an acronym for electronic data interchange and it can be defined as a form of communication between interconnected computer systems and software applications with respect to business informations in standard digital formats.

This ultimately implies that, electronic data interchange (EDI) involves the transfer of business informations such as financial transactions between the computer systems of various organizations such as banks, companies, governmental agencies, etc. Thus, it avails businesses the ability to create strategic communications using computer to computer links to effectively and efficiently exchange business informations electronically or in digital formats.

Hence, the EDI Semantic layer describes the business application that is driving electronic data interchange (EDI).

You might be interested in
How would you describe the difference between a syntax error and a logic error?
Ugo [173]

Answer:

hii

Explanation

syntax error:  a syntax error is an error in the syntax of a sequence of characters or tokens that is intended to be written in compile-time. A program will not compile until all syntax errors are corrected.

logic error:  logic error is a bug in a program that causes it to operate incorrectly, but not to terminate abnormally. A logic error produces unintended or undesired output or other behaviour, although it may not immediately be recognized as such.

6 0
3 years ago
Read 2 more answers
Is a NAS just a collection of hard drives or a computer
skelet666 [1.2K]

Answer:

NAS systems are networked appliances that contain one or more storage drives, often arranged into logical, redundant storage containers or RAID.

8 0
3 years ago
Which type of systems development is characterized by significantly speeding up the design phase and the generation of informati
nydimaria [60]

Answer:

Joint Application Development (JAD)

Explanation:

Joint Application Development is a method of application development that  lay emphasis on the up-front aspect of the application development cycle whereby steady communication between the designers and the intended users of the application under development by coming together in collaborative workshop styled discussions known as JAD sessions involving the mediators, facilitator, observers, end users, experts, and developers. As such with JAD process application development result in fewer errors high quality and is completed in lesser time.

3 0
2 years ago
Consider the following statements: Statement A: In Duplex transmission, either node can transmit while the other node can receiv
sergij07 [2.7K]

Answer:

<u>d. Statement A is true and Statement B is false</u>

Explanation:

Indeed, when using duplex transmission either node can transmit while the other node can receive data from the network. Also, in half-duplex transmission, both the nodes can transmit as well as receive data.

However, in half-duplex transmission, the nodes <em>cannot </em>transmit and receive data at the same time. Hence, this makes Statement B false, while Statement A is true.

4 0
2 years ago
IN PYTHON LANGUAGE
shtirl [24]

favorite_color = input("Enter favorite color:\n")

pet = input("Enter pet's name:\n")

num = input("Enter a number:\n")

print("You entered: "+favorite_color+" "+pet+" "+num)

password1 = favorite_color+"_"+pet

password2 = num+favorite_color+num

print("First password: "+password1)

print("Second password: "+password2)

print("Number of characters in "+password1+": "+str(len(password1)))

print("Number of characters in "+password2+": "+str(len(password2)))

This works for me.

8 0
2 years ago
Read 2 more answers
Other questions:
  • Each peripheral device has its own software, called a(n) ____, which contains the detailed instructions required to start that d
    6·1 answer
  • A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that su
    13·1 answer
  • The term integration refers to the ability to
    6·1 answer
  • If K is a foreign key in relation R1, then
    10·1 answer
  • . ____________is/are the JSP ImplicitObject(s).sessionapplicationconfigAll of GivenNone of Given
    9·1 answer
  • An mp3 takes up about 16 kilobytes of memory per second of music. if you owned a one terabyte hard drive and filled it with only
    15·1 answer
  • In black and white,<br><br> we must be more conscious of image
    11·1 answer
  • How to use access?<br> like working in access and bringing tables and stuff
    5·1 answer
  • What is 4x+2x(-3-3) thanku
    11·2 answers
  • Assessment
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!