Which sentence best justifies the benefits of using enterprise systems?


Early systems (in the 1960s) focused on the automation of individual functions, such as financial accounting and inventory management, primarily in the manufacturing industry. In the 1970s, the systems allowed planning of product requirements. Resource planning then began, which included not just shop floor planning but finance, engineering, human resources, distribution, and project management planning activities as well.

We now use enterprise systems that integrate all functions, including inventory control, accounting, and human resources. These systems use a single database containing all the data that keeps the processes running smoothly. This ensures visibility, accessibility, and consistency. Extended ERP systems include CRM, SCM, and advanced planning and scheduling. New systems include capabilities for business intelligence and cloud-based computing.

Answers

Answer 1
The first sentence is true
Answer 2

Answer:

These systems use a single database containing all the data that keeps the processes running smoothly. This ensures visibility, accessibility, and consistency.

Explanation:


Related Questions

HELP I SUCK IN THIS HELP!!!!! ​

Answers

Answer:

I think it's print(5**3)

What is a font? A)
a typeface on a label
B) a typeface on a poster
C) a typeface on a computer or d) a typeface on a sign

Answers

Answer:

A is most likely the answer

Explanation:

What is ransomware
я​

Answers

Answer:

Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. It has the ability to lock a computer screen or encrypt important, predetermined files with a password.

Explanation:

:)

Select the effective subject lines.


Timecard Machine Relocated

This Message Contains Some Important New Information About Company Operations

Please Use the New Form in the Revised Employee Manual for Filling Out Your Expense Reports, the Procedure Has Changed

Test Results Attached

New Expense Reporting Procedures

Servers

IT Department Closed for Server Maintenance

Answers

Answer:

dont click the link

Explanation:

Answer:

Please Use the New Form in the Revised Employee Manual for Filling Out Your Expense Reports, the Procedure Has Changed  

Servers

 

This Message Contains Some Important New Information About Company Operations

Explanation:

i did this on edge 2021 there is a quizlet with most of the questions

Use the drop-down tool to select the word or phrase that completes each sentence. Text within a document that is linked to other information available to the reader is called _______. A unique location for a computer on the network is its _______. The ________ is the ability of a network tor cover after any type of failure. The computer that responds to requests from the client computer is known as the ________. A ________ is an ordered list of tasks waiting to be performed.

Answers

Answer:

1. Hyperlink

2. IP address

3. Fault tolerance

4. Server

5. To do list

Explanation:

Text within a document that is linked to other information available to the reader is called HYPERLINK.

A unique location for a computer on the network is its IP ADDRESS.

The FAULT TOLERANCE is the ability of a network to cover after any type of failure.

The computer that responds to requests from the client computer is known as the SERVER.

A TO-DO LIST is an ordered list of tasks waiting to be performed.

Answer:

hypertext

IP address

fault tolerance

server

queue

Explanation:

just did it on edg

give a summary of html forms​

Answers

HTML forms are used to collect data from users. Users essentially enter data into forms by filling in text fields, selecting toggles and making choices from selection objects. When the user has filled in the data it is transmitted to the server for processing. HTML forms are specified using the <form> element.

Hope this helps you!

8.6 Code Practice: Question 2
Copy and paste your code from the previous code practice. If you did not successfully complete it yet, please do that first before completing this code practice.

After your program has prompted the user for how many values should be in the array, generated those values, and printed the whole list, create and call a new function named sumArray. In this method, accept the array as the parameter. Inside, you should sum together all values and then return that value back to the original method call. Finally, print that sum of values.

Answers

Answer:

import random

def buildArray():

   amount = int(input("How many values to add to the array: "))

   array = []

   for i in range(amount):

       array.append(random.randint(10, 99))  

   return array

array = buildArray()

print(array)

def sumArray(array):

   return sum(array)

sum_array = sumArray(array)

print("The total is: ", sum_array)

Explanation:

this gave me 80%

In this exercise we have to use the knowledge of computational language in python to write the code.

We have the code in the attached image.

The code in python can be found as:

import random

def buildArray():

  amount = int(input("How many values to add to the array: "))

  array = []

  for i in range(amount):

      array.append(random.randint(10, 99))  

  return array

array = buildArray()

print(array)

def sumArray(array):

  return sum(array)

sum_array = sumArray(array)

print("The total is: ", sum_array)

See more about python at brainly.com/question/26104476

I need help I have questions I need answers in coding html,css,js and python.Fast
The purpose of the sleep method is to reduce the amount of energy the program uses.
True
False
The _____ is a collection of webpages that use the internet.
pseudocode
World Wide Web
Python
server
Which of the following lines of code would correctly create a list called weapons?
weapons == [“sword”, “sling”, “knife”]
weapons = [“sword” or “sling” or “knife”]
weapons = (“sword”, “sling”, “knife”)
weapons = [“sword”, “sling”, “knife”]
Which of these lines of code would import both the random and the time modules?
import random, time
import random and time
time.import, random.import
import(random, time)
When using HTML, your text should be placed between the opening and the closing tags.
True
False

Answers

Answer:

1. True

2. World Wide Web

3. weapons = [“sword”, “sling”, “knife”]

4. import random, time

5. True.

Explanation:

For number 1  I'm not quite sure since I never personally used it, but it does reduce CPU usage when activated so it's very possible it's true.

Which of the following is a table which can be rearranged to analyze data in a variety of ways?
A. Pivot Table
B. HLOOKUP Table
C. VLOOKUP Table
D. PivotLookup

Answers

Answer:

A. Pivot Table

Explanation:

Given that a Pivot Table is a form of a table in statistics that comprises various data of several tables in a shortened form.

This table is then used to carry out analysis of data in numerous ways to reach a meaningful conclusion to make a decision.

Hence, in this case, the correct answer is a PIVOT TABLE.

How did imperialism lead to WWI? A The debate of the morality of imperialism created tensions around Europe b Native people were conquered and rebelled against Europe c Europe went into an economic depression when imperialism failed d European nations competed and made alliances to control colonies

Answers

Answer:

d. European nations competed and made alliances to control colonies.

Explanation:

The world War I was a period of battle between various countries from 1914 to 1918. It started formally on the 28th of July, 1914 and ended on the 11th of November, 1918.

Imperialism can be defined as a policy, ideology, or advocacy that sought to extend a country's power, dominion, authority and influence over another country through diplomacy, use of military force or colonization (direct territorial acquisition).

This ultimately implies that, imperialism is an advocacy or policy that is typically used to impose or extend a country's power, dominion, authority and influence. It simply means to seek colonies of other nations or countries.

Hence, imperialism led to WW1 because European nations competed and made alliances to control colonies.

In conclusion, there was an eagerness on the part of European Nations to gain colonial territories that were owned by other rival nations.

pLZ PLZ PLZ HELP I HAVE SO MANY MISSING ASSINMENTS. why is physical security so important and necessary for both personal users and businesses?

Answers

Physical security is important because a physical attack is perhaps the most fundamental kind of attack. ... Using a floppy drive or CD-ROM drive on a machine that does not support good BIOS security. Damage to or theft of important machine components, especially those that store data. Theft of an entire machine

What is meant by the term internal hardware??
explain it in your own words ,do not use goo.gle thank you!

Answers

Answer:

Internal hardware devices include motherboards, hard drives, and RAM. External hardware devices include monitors, keyboards, mice, printers, and scanners. The internal hardware parts of a computer are often referred to as components, while external hardware devices are usually called peripherals

Answer:

Internal hardware is the hardware that is inside the computer. For example, CPU, RAM, ROM BIOS, Motherboard, Graphics card.

It is a way of creating a name, symbol, color, and design to establish and differentiate a product from its prospect competitors

Answers

Answer:

Branding

Explanation:

The term that is being defined by the question is known as Branding. This is what companies do to products in order to allow customers to distinguish the product from the competitors similar products. Doing so allows a company to attract and maintain customers since a customer will see become aware of the branded product and buy it. If the purchasing experience goes well they will begin to associate the good experience with the brand and therefore with the company as well.

1. Harold Worden, then 56-years-old, stole Kodak property
that was worth millions of dollars. He had worked for
Kodak for over 30 years and did not return confidential
documentation when he left the company in 1992.
He attempted to try and sell his ill-gotten gains to Kodak's
competitors while trying to start his own consulting firm.

The following scenario is an example of?​

Answers

Answer:

Industrial espionage

Explanation:

Espionage is defined as the act of spying or the use of spies to acquire information on the activities and plans of a government of another country or those of a company in a competitive market

It is the practice of obtaining confidential or secret information and can be considered a felony depending on the case circumstances and the manner of damages caused by the act which is provable and made by the claimant

Industrial espionage is also known as economic espionage

What should a user do to find and replace text throughout a field? Use the drop-down menus to complete the steps
1. Put the cursor in the field to search
2. In the Home tab, open the dialog box
3. On the
tab, enter the text to search for and the replacement text
4. After a few instances to make sure the text is being replaced correctly, you can then click
to
change all instances

Answers

The thing that a user should do to find and replace text throughout a field  are:

1. Put the cursor in the field to search.

2. Open the  find  dialog box.

3. On the Replace tab, enter the text to search for and the replacement text.

4. Click  Replace All  to change all instances.

How do you search for and replace text across an entire field?

The keys on the keyboard CTRL+F is often used  to find. The dialog window for Find and Replace appears. Click the Find tab in the Find and Replace dialog box to search for data. Click the Replace tab to perform a find-and-replace operation.

The operations are:

1. Click Find and Select in the Editing group on the Home tab, then select Replace from the drop-down list.

2. In the dialog box, select the objects you want to Find and Replace by clicking the Options button.

3. Press the Replace or Replace All button.

Therefore, If you want to replace all occurrences of a word or format in a document, use the Ctrl+H Find and Replace function. This is very useful for lengthy papers.

Learn more about Editing  from

https://brainly.com/question/15768529
#SPJ1

See full question below

What are the steps to replace one piece of text with another throughout a field? Use the drop-down menus to

complete the statements.

1. Put the cursor in the field to search.

2. Open the _____

dialog box.

3. On the Replace tab, enter the text to search for and the replacement text.

4. Click -------to change all instances.

Join for a pack battle loud microphone.

Answers

you look like the battle passss

Why do we use if statements?



To tell Tracy to stop our code if there’s an error


To have Tracy make decisions based on conditional statements


To tell Tracy to do something if we run our code


To have Tracy complete one function at a time

Answers

answer is 2 i’m pretty sure

Please help! No one is answering these correctly!
A gateway is a common network hardware component that does what?
enables a network to connect to other networks
verifies user credentials to grant network access
connects many devices to a network using a single port
allows specific kinds of data into different parts of a network
What is the best way to prevent the most common cause of network failure?
Avoid using USB cables for connecting devices.
Maintain careful records of networked devices.
Use up-to-date antiviral software to protect computers.
Upgrade routers and servers annually.

Answers

Answer:

it is either c or d

I'm 99.5% sure it is C tho

when should a computer definitely have an ip address

Answers

What do you mean they all come with ip once you buy it
There are two types of IP addresses. PUBLIC IP is assigned by the ISP and PRIVATE IP address provided by your Router. When you are connected to network you definitely should have an IP address.

what is the best free website to learn phyton programming

Answers

That is something you should may research on with yourself! Don’t accept a link
From strangers it’s preferred to find one that best suits you!

Timmy walks into a store to buy a PC game. He reads this information about a game on its packaging:

System Requirements
Minimum Recommended
Processor Intel Core i3 or equivalent Intel Core 2 Quad or higher
Memory 2 GB 4 GB or higher
Video Card Integrated Discrete


Based on this information, which statement is true?
A.
Timmy can play the game even if his computer’s specifications don’t meet the minimum requirements.
B.
Timmy can play the game even if his computer has less than 2 GB memory.
C.
Timmy can play the game at a higher level of visual detail if his computer has an integrated video card.
D.
Timmy can play the game even if his computer’s processor class is lower than an Intel Core i3.
E.
Timmy can play the game at a higher level of visual detail if his computer has an Intel Core 2 Quad processor.

Answers

Answer:

C. Timmy can play the game at a higher level of visual detail if his computer has an integrated video card.

Explanation:

The processor efficiency and memory requirements are much more necessary to get the game to run and give it a playable framerate. Having a video card will improve his graphics, so this is more of a suggestion than a necessity.

what are the uses of plotters​

Answers

Answer:

Plotters are use to produce the hard copy of schematics and other similar applications They are mainly used for CAE applications.They can print on a wide variety of flat materials

Hope it helps :)❤

Answer:

 Plotters are used to print graphical output on paper. It interprets computer commands and makes line drawings on paper using multicolored automated pens. It is capable of producing graphs, drawings....

HELP PLEASE!!!!

3. Memory and Storage
The GCSE Computer Science course requires that you
understand how decimal numbers are converted into
binary, and vice versa.
Can you convert the numbers 12, 24, 48 and 96 into binary form?​

Answers

Answer:

1100 ; 11000 ; 110000 ; 1100000

Explanation:

Converting the following decimals to binary :

2__12

2__6 r 0

2__3 r 0

2__1 r 1

___0 r 1

12 = 1100 base 2

2.)

2__24

2__12 r 0

2__6 r 0

2__3 r 0

2__1 r 1

___0 r 1

24 = 11000 base 2

2__48

2__24 r 0

2__12 r 0

2__6 r 0

2__3 r 0

2__1 r 1

___0 r 1

48 = 110000 base 2

2__96

2__48 r 0

2__24 r 0

2__12 r 0

2__6 r 0

2__3 r 0

2__1 r 1

___0 r 1

96 = 1100000 base 2

Every single device can be connected to every other device on network, making the network mesh. This statement is True or False? *
1 point
True
False​

Answers

Answer:

true

Explanation:

we can connect to any device which has a network connection

1.Two robots start out at 426c cm. apart and drive towards each other. The first robot drives at 5 cm per second and the second robot drives at 7 cm. per second. How long will it take until the robots meet?

In your response below, please answer each of the following questions:
a. What is the question being asked?
b. What are the important numbers?
c. Are their any variables?
d. Write an equation.
e. Solve the equation.
f. Do you think your answer is reasonable? Explain.

Answers

Answer:

a. The time it will take for the two robots meet

b. The important numbers are;

426 (cm), 5 (cm/second) and 7 (cm/second)

c. Yes, there are variables

d. The equation is 5 cm/s × t + 7 cm/s × t = 426 cm

e. The solution of the equation is, t = 35.5 seconds

f. Yes, the answer is reasonable

Explanation:

a. The question being asked is the time duration that will elapse before the two robots meet

b. The important numbers are;

The distance apart from which the two robots start out, d = 426 cm

The  speed of the first robot, v₁ = 5 cm/second

The  speed of the second robot, v₂ = 7 cm/second

c. The variables are;

The distance apart of the two robots = d

The  speed of the first robot = v₁

The  speed of the second robot = v₂

The time it takes for the two robots to meet = t

d. The equation is;

v₁ × t + v₂ × t = d

Plugging in the known values of v₁, v₂, we have;

5 cm/s × t + 7 cm/s × t = 426 cm...(1)

e. Solving the equation (1) above gives;

5 cm/s × t + 7 cm/s × t = t × (5 cm/s + 7 cm/s) = t × 12 cm/s = 426 cm

∴ t = 426 cm/(12 cm/s) = 35.5 s

t = 35.5 seconds

f. The time it would take the two robots to meet, t = 35.5 seconds

The answer is reasonable, given that the distance moved by each robot in the given time are;

The distance moved by the first robot, d₁ = 35.5 s × 5 cm/s = 177.5 cm

The distance moved by the second robot, d₂ = 35.5 s × 7 cm/s = 248.5 cm

d₁ + d₂ = 177.5 cm + 248.5 cm = 426 cm.

Help Please! Computer science question !!!!!!!!!!20 points!!!

Answers

Answer:

45 abc

Explanation:

PLEASE HELPPPPPPP What should you always disconnect before installing hardware inside a computer’s case?

A.
all cabling
B.
all internal components
C.
the CPU
D.
the internal DVD drive

Answers

Answer:

a) all cabling hope it helps

--concept mapping--
importance of trees for people:
1.
2.
3.
4.
5.
importance of trees for animals
1.
2.
3.
4.
5.​

Answers

Answer:

-Both need oxygen from the trees to breathe

-Without trees the population of animals and people would be dying

Explanation:

Thats all I can think of

Other Questions
With which set of information can you construct a unique triangle?.the measurements of all the anglesB.the lengths of two sidesC.the measurements of two anglesD.the lengths of all the sidesE.the measurement of one angle Quadrilateral BCDE is inscribed in circle A. The measure of is 73. The measure of is 53 and the measure of is 102. Determine the measure of BCD. What is one way that authors can come up with ideas for providing context for their readers?(1 point)brainstormingeditingwriting a draftmaking an outline Why does the author say that Rosa Parks "dared disturb the peace"? PLS HELP ASAP Select the word that means how easily water can move through a substance. Lesson 2.03 o particles permeability porosity Solve the area of a rhombus show the formation of oxygen molecule I need help with this problem I'll give brainlist to whoever answers it right4+23-9 what type of industries is suitable to establish in Nepal? justify your answer in four points. Tells are ruins of cities, one on top of another.true or false does 10,15,18 form an acute triangle 1.What landforms are found in Florida?2.What are some reasons why landforms are found in specific regions?3.What factors are involved in the formation of Floridas landforms?4.What landforms are present near our school?5.Where is there evidence of weathering/erosion/deposition in Floridas landforms? Metagenomics (check all that apply): Group of answer choices Can leverage Next Generation Sequencing technology to identify and characterize organisms. Rarely finds previously unknown microorganisms. Has resources to support analysis at the DOE-JGI site. Can identify microbiologic organisms without traditional isolation and culturing of individual organisms. According to the graph, at what price will Ashleys quantity demanded of pizza be three slices? Help Can someone please check my answer??!!! if same earns $2 more, hell have $24. How much does he have to start out with? i need help asap thank you Angela is 4 feet 7 inches tall. Angela's doll is 11 inches tall. What is the ratio of Angela's height to thedoll's height? Ben paid $45 for an old guitar he cleaned the guitar, then resold it after marking the price 15% he used 36% of the money he got for the the guitar to buy books how much money did ben spend on books? African masks and sculpture was made to:O for neither of the above reasonsO hang on the walls of homes for decorationsO to be used in different ceremoniesO to make money on the side