1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arlik [135]
3 years ago
9

A(n) ________ system collects data from various key business processes and stores the data in a single comprehensive data reposi

tory, usable by other parts of the business.
A) transaction processing
B) enterprise
C) automatic reporting
D) management information
Computers and Technology
1 answer:
Anni [7]3 years ago
4 0
Management information
You might be interested in
What is the function of an ISP,a browser and a mobile browser?​
ruslelena [56]

An internet service provider (ISP) is a company that provides web access to both businesses and consumers. ISPs may also provide other services such as email services, domain registration, web hosting, and browser services.

The purpose of a web browser is to fetch information resources from the Web and display them on a user's device. This process begins when the user inputs a Uniform Resource Locator (URL), such as wikipedia.org, into the browser.

A mobile browser is a web browser designed for use on a mobile device such as a mobile phone or PDA. Mobile browsers are optimized to display Web content most effectively for small screens on portable devices.

8 0
3 years ago
Which image file format is the most widely used?
Ostrovityanka [42]

Answer: jpeg because its a lot of people use it for quaity

7 0
2 years ago
What are the most common types of tasks performed by utility programs? accessibility
denis23 [38]
The most common type of task performed by utility program is the file management. The utility program is a program created to help computer users in managing, optimizing, and configuring the computer. Every newly purchased computer has a file managing program to help users for setting the computer up for its personal use. Therefore, file managing is the most common utility program.
6 0
4 years ago
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in
Nataliya [291]

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
6 0
3 years ago
Once an illustration has been decomposed, you can change the color of different items in that illustration.
Delicious77 [7]

Answer:

its true

Explanation: took the quiz

3 0
3 years ago
Other questions:
  • If you inadvertently delete a file, you may be able to retrieve it from the A. Drop Box. B. System Restore. C. Restore File. D.
    15·1 answer
  • How does the browser display the same webpage whether you enter the URL or the IP address in the address bar? What system transl
    14·1 answer
  • In a shooter game, players can play “capture the flag,” which is a multiplayer game in which players of a team need to collect f
    15·2 answers
  • Technologies that allow for instant worldwide communication include satellite and computer systems. mobile phones and internet a
    8·2 answers
  • Within a single program, __________________ allows multiple parts, or threads, to run simultaneously.
    15·1 answer
  • The Mail Merge option is located in which tab? a;home b;insert c;refernces d;mailings
    11·2 answers
  • Create a class called MyBoxes with: - 1 instance variable, and array to hold Box objects - a constructor with 1 parameter - the
    9·1 answer
  • A set of object that share a common structure and common behavior in database is called ​
    13·1 answer
  • Which validation check can be used on the following data. "XX000" 
    9·1 answer
  • Write a program that asks the user for his or her name, then asks the user to enter a sentence that describes himself or herself
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!