1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
2 years ago
14

What is the most likely reason a company would use enterprise software?

Computers and Technology
1 answer:
alexdok [17]2 years ago
8 0

Answer:

most likely reason would be organizations looking to manage their business functions within a centralized and integrated system

Explanation:

You might be interested in
This might sound crazy! But please help.
aliya0001 [1]

Answer:

You Probably should’nt do that

Explanation:

8 0
2 years ago
So i'm trying to figure out why this code wont run can anyone help me
MaRussiya [10]

Answer:

<em><u>use</u></em><em><u> </u></em><em><u>the</u></em><em><u> </u></em><em><u>ope</u></em><em><u>ning</u></em><em><u> </u></em><em><u>and</u></em><em><u> </u></em><em><u>cl</u></em><em><u>osing</u></em><em><u> </u></em><em><u>tags</u></em><em><u> </u></em>

<em><u>[</u></em><em><u>Tex]</u></em><em><u> </u></em><em><u>[</u></em><em><u>\</u></em><em><u>t</u></em><em><u>e</u></em><em><u>x</u></em><em><u>]</u></em><em><u> </u></em><em><u>ok</u></em>

8 0
3 years ago
Mattias's friend asked him to critique his presentation about gorillas. Mattias noticed that there weren't any images of gorilla
Deffense [45]

Answer:

c

Explanation:

7 0
3 years ago
(PLATO) How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple ___ en
EastWind [94]

The missing word here is social.

Social engineering involves using simple human methods to steal data, such as looking through peoples’ drawers for pieces of paper on which they might have written down passwords, or perhaps sneaking a look at the keys you press while walking past your desk as you are typing your password. Such behaviors designed to steal your personal information are methods of social engineering.

Let me know if you have any questions.

5 0
3 years ago
What two things should you do before starting the design process
Charra [1.4K]

Answer: B and C

Explanation: Analyze the audience

                      Identify the problem

8 0
3 years ago
Other questions:
  • A ___ block unauthorized access to a network or an individual computer
    8·1 answer
  • In mathematics, the factorial of a positive integer n, denoted as n! , is the product of all positive integers less than or equa
    10·2 answers
  • Consider the following method:
    8·2 answers
  • In which career field would the computing technology industry associations compTIA A+ certification be useful
    6·1 answer
  • Dynamic alliance networks work best in industries: a. that are mature and stable in nature. b. where the coordination of product
    9·1 answer
  • Ex: If the input is: Pat Silly Doe the output is: Doe, P.S.
    9·1 answer
  • ____________ is a script or a tool that obtains privileges of a root
    8·1 answer
  • When you call a ____________ method, it executes statements it contains and then returns a value back to the program statement t
    6·2 answers
  • A(n) __________ is a server with the original copy of the data that others need.
    12·1 answer
  • In Windows, which menu allows you to view file characteristics?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!