1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr1967 [171]
3 years ago
12

What is the core function of an enterprise platform

Computers and Technology
2 answers:
stich3 [128]3 years ago
4 0

Hello user!

Core function is to provide tools for effective communication. Platforms transforms connections into transactions, ensuring that the transaction is in the correct format for communicating and that it communicates properly. Providing critical communication and coordination tools and services is the core function.

tino4ka555 [31]3 years ago
4 0

Answer:

Platforms convert connections into transactions, ensuring that each transaction is sent in the proper format and that all parties involved are aware of each other's progress.

Explanation:

You might be interested in
Who needs to be involved when assembling business solutions that include hardware and software?
sveta [45]
Software engineer i would say
5 0
3 years ago
Read 2 more answers
What is the name of a button on a website?
zhuklara [117]
May I know which button?
5 0
3 years ago
Coding question. Please help me?
Marizza181 [45]

Answer:

a  for a loop

Explanation:

7 0
3 years ago
What are two characteristics of switches? (Choose two.) * 1 point A. Switches identify the intended destination of the data that
tigry1 [53]

Answer:

A. Switches identify the intended destination of the data that they receive. And C. Switches are capable of sending and receiving data at the same time

Explanation:

Switches can be used as inputs (Analog), or outputs (digital). These inputs and outputs are signals that the switches send or receive- Or at least as push button switches... But the same applies to network switches.

Hope this helps! Have a great day!

7 0
3 years ago
What threat do insiders with authorized access to information or information systems pose
ki77a [65]

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.

7 0
3 years ago
Other questions:
  • Your revenue is $22,000. Your Cost of Goods is 16,250. Your gross profit is _____________, fill in the blank,.
    14·1 answer
  • A pacing calendar is provided to students so they can:
    8·2 answers
  • The _______________ is a priority-ordered list of the other carrier networks and frequencies it should search for when it cannot
    6·1 answer
  • Original phone call greeting for oncologist
    10·1 answer
  • Can someone answer this, I'll mark u the brialintest
    11·1 answer
  • When using a small mic that attaches to your interview subject, where should you place that mic and why?
    5·1 answer
  • Text to appear
    12·1 answer
  • I<br> What is a Watermark?
    9·2 answers
  • Prior to the 1996 NEC, ____ receptacles and cords were permitted. However, now it is mandatory that a separate equipment groundi
    11·1 answer
  • 1.1 give five (5) reasons why modeling is an important part of system analysis and design
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!