Identify the goal of an enterprise resource planning (ERP) system.
To enable easy access to business data and create efficient, streamlined work processes

Answers

Answer 1

The goal of enterprise resource planning (ERP) is to enable organizations to access business data easily and create and streamline the work processes of the organization efficiently. Therefore, D is the correct option for this question.

A form of software known as enterprise resource planning (ERP) is used by enterprises to manage routine business operations like accounting, purchasing, project management, compliance and risk management, and logistics management. Enterprise performance management software, which facilitates the organization in planning, preparing budgets, forecasting, and reporting financial results. These components are of full ERP suit version.

ERP systems enable the exchange of data between different departments of the organization and tie them all together. ERP systems ensure data integrity and avoid data duplication among different departments of the organization by gathering an organization's shared transactional data from several sources of the departments. ERP helps the organization to create, and streamline their work processes efficiently.

"

The complete question is given below:

Identify the goal of an enterprise resource planning (ERP) system.

A. To conduct collaborative live meetings or presentations over the Internet

B. To evaluate and select appropriate activities and projects for outsourcing

C. To define the customer's right to audit the provider's compliance with industry standards

D. To enable easy access to business data and create efficient, streamlined work processes

"

You can learn more about ERP at

https://brainly.com/question/28104535

#SPJ4


Related Questions

If an image has only 4 colors, how many bits are necessary to represent one pixel’s color in RGB?

Answers

Answer:

Form is the overall structure of the visual elements of a piece. Form can be represented by four categories: representational, objective, realistic, and naturalist.

Explanation:

brainliest

complete the expression so that userpoints is assigned with 0 if useritems is greater than 20 (second branch). otherwise, userpoints is assigned with 10 (first branch).

Answers

The expression provided is an example of a ternary operator, which is a type of operator that takes three operands.

userpoints = (useritems > 20 ? 0 : 10);

In this case, the first operand is the comparison of useritems being greater than 20, the second operand is the value that should be assigned to userpoints if the comparison is true (in this case 0), and the third operand is the value that should be assigned to userpoints if the comparison is false (in this case 10). The expression 'userpoints = (useritems > 20 ? 0 : 10);' is complete and assigns 0 to userpoints if useritems is greater than 20, otherwise it assigns 10 to userpoints.

Learn more about programming: https://brainly.com/question/26134656

#SPJ4

Jerry purchased 25 dozens of eggs. He used 6 eggs to bake 1 cake. How
many similar cakes can Jerry bake with the number of eggs he purchased?​

Answers

Answer:

50

Explanation:

He bought 25 dozens of eggs:

25 (12) = 300

He used 6 eggs to make 1 cake, so:

300 eggs/6 eggs per cake = 50 cakes

Arrange the sections according to their order of appearance in the SRS document.

Arrange the sections according to their order of appearance in the SRS document.

Answers

Based on the information given, the order of appearance will be Overview, Assumptions, Product functions, General Constraints, and References.

What is a SRS document?

A software requirement specification document simply means the document that describes what the software will do and how it'll be expected to preform the work.

The order of appearance will be Overview, Assumptions, Product functions, General Constraints, and References. These are vital for the overall function of the program.

Learn more about the SRS document on:

https://brainly.com/question/22895405

Answer:

Assumptions, Product functions, General Constraints, and References

Explanation:

Instructions
Click the links to open the resources below. These resources will help you complete the assignment. Once you have created your file(s) and are ready to upload your assignment, click the Add Files button below and select each file from your desktop or network folder. Upload each file separately.
Your work will not be submitted to your teacher until you click Submit.

InstructionsClick the links to open the resources below. These resources will help you complete the assignment.

Answers

The assignment is about Telephone, internal combustion engine, and electrical light.

What is file?

A file is a  computer system container for storing data. Files used in computers are similar in characteristics to  paper documents used in libraries and office files. There are different types of files like text files, data files, folders, binary and graphic files and these different types of files store different types of data. A computer's operating system can store files  on optical discs, hard drives,  or other types of storage devices.

In most operating systems, a file must have a unique name within a specific directory. However, when creating a file name, some characters are considered illegal and therefore cannot be used. A file name consists of a name with an extension, also known as a file extension. The file extension is the two to four characters after the period of the full file name.

To learn more about file, refer;

https://brainly.com/question/29055526

#SPJ4

Java question

If the user wants to enter one character what statement you use?

1- next()?

2-next(0)?

3-CharAt(0).

4-next().charAt(0).

Answers

Answer:

To be honest why would you want to enter one character. Anyways the answer is option 4

Create pseudocode that could be used as a blueprint for a program that would do the following: An employer wants you to create a program that will allow her to enter each employee’s name, hourly rate of pay, number of hours worked in one week, overtime pay rate, payroll deductions (such as medical insurance, savings, etc.), and tax rate. The program should output the employee’s gross pay (before taxes and deductions) and net pay (after taxes and deductions) for each employee for one week.

Answers

Answer:

START LOOP FOR EACH EMPLOYEE:

   INPUT employee’s name, hourly rate of pay, number of hours worked, overtime pay rate, payroll deductions, tax rate

   SET gross pay = (hourly rate of pay x *weekly hours) + (overtime pay rate x (number of hours worked - *weekly hours))

   PRINT gross pay

   SET net pay = gross pay - (payroll deductions + (gross pay * tax rate/100 ))

   PRINT net pay

END LOOP

* weekly hours (how many hours an employee needs to work to earn overtime pay rate) is not given in the question

Explanation:

Create a loop that iterates for each employee

Inside the loop, ask for name, hourly rate, number of hours worked, overtime pay rate, payroll deductions, tax rate. Calculate the gross pay and print it. Calculate the net pay and print it

Every workplace should have an emergency plan of action.


Please select the best answer from the choices provided

T
F

Answers

It is true that every workplace should have an emergency action plan.

What is an emergency action plan (EAP)?

A written document required by specific OSHA standards is an emergency action plan (EAP). [29 CFR 1910.38(a)] An EAP's purpose is to facilitate and organize employer and employee actions in the event of a workplace emergency.

During an emergency, well-developed emergency plans and proper employee training (so that employees understand their roles and responsibilities within the plan) will result in fewer and less severe employee injuries and less structural damage to the facility.

A poorly prepared plan will almost certainly result in a disorganized evacuation or emergency response, causing confusion, injury, and property damage.

So, the correct answer to the question is True (T).

To know more about the emergency action plan, visit: https://brainly.com/question/3238467

#SPJ1

how can a computer be used by a manager of a shopping mall​

Answers

Answer:

- used to look at security cameras

- used to buy supplies for the mall (maintenance)

- billing

Answer:

With growing square footage of shopping malls, however, comes the challenge of managing these super structures. Shopping mall managers need to take care of all tenant and building services, including physical security hardware of both the individual tenants’ spaces, the general facility and common areas.

What are some of the security and access control challenges unique to shopping centers and malls?

Multiple tenants across multiple buildings. Access for tenants with their own set of employees needs to be managed efficiently.

Tenant turnover.  When a tenant terminates his lease, his ability to access the space should be completely revoked.  Mall management must be able to do this in a timely manner for the security of the shared property and for the safety of the next tenant.

Expansion, reduction and relocation of tenants within facilities.  While this does not entail revocation of access, mall management must be able to provide smooth transition, in terms of access control to the new space, and denial of access to the previously-occupied space where a new tenant will be moving in.

Security for Shared Entrances and Spaces. Managing access privileges for shared facilities like that in a mall can be challenging. For instance, if a tenant in a mall hires or fires an employee, mall management needs to be informed so they can update access privileges to common entrances and shared spaces. This also applies for maintenance workers, cleaning crews and the like. An efficient access control system allows mall management to control access privileges with ease.

Explanation:

Medical assistant, Jackie, was downloading some patient information on cerebral palsy from the Internet. While downloading, Jackie noticed the computer was working slower than usual. When Jackie clicked on a web site that she needed to review, the computer would not take her to the designated website. Instead, the computer took her to an alternative site. Jackie soon noticed that even when she was working offline using a word processing software program, the computer was acting up. When she went to
the medical software, she could not bring up patient account information.


Question:

What happened and what should Jackie do?

Answers

The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious  app obstructing her.

What is a system hack?

System hacking is known to be when one's computer is said to be compromise in regards to computer systems and software.

Note that The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious  app obstructing her.

Learn more about system hack from

https://brainly.com/question/13068599

#SPJ1

Driving is expensive. Write a program (in Python) with a car's miles/gallon and gas dollars/gallon (both floats) as input, and output the gas cost for 20 miles, 75 miles, and 500 miles.


Output each floating-point value with two digits after the decimal point, which can be achieved as follows:

print('{:.2f} {:.2f} {:.2f}'.format(your_value1, your_value2, your_value3))

Answers

x=float(input("How many miles can your vehicle travel on 1 gallon of gasoline?: "))

y=float(input("How much does 1 gallon of gasoline cost?: "))

print('20 miles: {:.2f}$\n75 miles: {:.2f}$\n500 miles: {:.2f}$'.format((20/x)*y, (75/x)*y, (500/x)*y))

Someone help me for about how to avoid online scams please I need help no trolls

Answers

Answer:

1. (for emails) Block spam messages.

2. Look at who sent whatever it is and make sure it is the exact email for the brand.

3. If someone is putting a lot of emojis in a comment or somthing its fake.

4. Make sure to read the fine print.

5. Do not giveaway personal information like zip code, address, social security number.

$
Type the correct answer in the box. Spell all words correctly.
What file format was created for video by Microsoft?
_______was created by Microsoft.
ANYONE NOW!!

$Type the correct answer in the box. Spell all words correctly.What file format was created for video

Answers

Answer:

Windows media video

Explanation:

it is the most recognizable video compression format within the WMV family

Answer:

AVI

Explanation:

AVI is defined by Microsoft. The avi file format is the most common format for audio and video data on a computer.

I got it right on the test!

You would like the cell reference in a formula to remain the same when you copy
it from cell A9 to cell B9. This is called a/an _______ cell reference.
a) absolute
b) active
c) mixed
d) relative

Answers

Answer:

The answer is:

A) Absolute cell reference

Explanation:

An absolute cell reference is used in Excel when you want to keep a specific cell reference constant in a formula, regardless of where the formula is copied. Absolute cell references in a formula are identified by the dollar sign ($) before the column letter and row number.

Hope this helped you!! Have a good day/night!!

Answer:

A is the right option absolute

In most cases, the word "software" is interchangeable with the word

Answers

Answer:

In most cases, the word "software" is interchangeable with the word "program"

Explanation:

The terms software and program are used interchangeably as they often refer to the same thing in daily usage.

The are two schools of ____________ are Symmetry and Asymmetry.

Answers

The two schools of design that encompass symmetry and asymmetry are known as symmetrical design and asymmetrical design.

Symmetrical design is characterized by the balanced distribution of visual elements on either side of a central axis. It follows a mirror-like reflection, where the elements on one side are replicated on the other side, creating a sense of equilibrium and harmony.

Symmetrical designs often evoke a sense of formality, stability, and order.

On the other hand, asymmetrical design embraces a more dynamic and informal approach. It involves the intentional placement of visual elements in an unbalanced manner, without strict adherence to a central axis.

Asymmetrical designs strive for a sense of visual interest and tension through the careful juxtaposition of elements with varying sizes, shapes, colors, and textures.

They create a more energetic and vibrant visual experience.

Both symmetrical and asymmetrical design approaches have their merits and are employed in various contexts. Symmetry is often used in formal settings, such as architecture, classical art, and traditional graphic design, to convey a sense of elegance and tradition.

Asymmetry, on the other hand, is commonly found in contemporary design, modern art, and advertising, where it adds a sense of dynamism and creativity.

In conclusion, the schools of symmetry and asymmetry represent distinct design approaches, with symmetrical design emphasizing balance and order, while asymmetrical design embraces a more dynamic and unbalanced aesthetic.

For more such questions on symmetry,click on

https://brainly.com/question/31547649

#SPJ8

PLEASE HELP
Find five secure websites. For each site, include the following:

the name of the site

a link to the site

a screenshot of the security icon for each specific site

a description of how you knew the site was secure

Use your own words and complete sentences when explaining how you knew the site was secure.

Answers

The name of the secure websites are given as follows:

wwwdotoxdotacdotuk [University of Oxford]wwwdotmitdotedu [Massachusetts Institute of Technology]wwwdotwordbankdotorg [World Bank]wwwdotifcdotorg [International Finance Corporation]wwwdotinvestopediadotorg [Investopedia]

Each of the above websites had the security icon on the top left corner of the address bar just before the above domain names.

What is Website Security?

The protection of personal and corporate public-facing websites from cyberattacks is referred to as website security.

It also refers to any program or activity done to avoid website exploitation in any way or to ensure that website data is not accessible to cybercriminals.

Businesses that do not have a proactive security policy risk virus spread, as well as attacks on other websites, networks, and IT infrastructures.

Web-based threats, also known as online threats, are a type of cybersecurity risk that can create an unwanted occurrence or action over the internet. End-user weaknesses, web service programmers, or web services themselves enable online threats.

Learn more about website security:
https://brainly.com/question/28269688
#SPJ1

PLEASE HELPFind five secure websites. For each site, include the following:the name of the sitea link

what is computer hardware​

Answers

Computer hardware refers to the physical components of a computer system that can be seen and touched. It encompasses all the tangible parts that make up a computer, enabling it to function and perform various tasks. Hardware includes devices such as the central processing unit (CPU), memory (RAM), storage devices (hard drives, solid-state drives), input devices (keyboard, mouse), output devices (monitor, printer), and other peripheral devices (speakers, scanners, etc.).

These hardware components work together to execute and manage data and instructions within a computer system. The CPU acts as the brain of the computer, performing calculations and executing instructions. Memory provides temporary storage for data and instructions that the CPU can quickly access. Storage devices store data in a more permanent manner, allowing it to be retained even when the computer is turned off.

Input devices enable users to input data and commands into the computer, while output devices display or present processed information to the user. Peripheral devices expand the capabilities of the computer system, providing additional functionalities and connectivity options.

Computer hardware is essential for the functioning of a computer and determines its processing power, storage capacity, and overall performance. It is complemented by software, which provides the instructions and programs necessary to utilize the hardware effectively. Together, hardware and software form the foundation of modern computer systems.

For more such questions on components, click on:

https://brainly.com/question/28351472

#SPJ11

Which is the instance variable in the given code?

public class Person{

public intpid;

private double salary;

public Person (intpersonID){
pid = personID;
}

public void setSalary(double empSal){
salary = empSal;
}

public void printDetails(){
System.out.println("id : " + pid );
System.out.println("salary :" + salary);
}

public static void main(String args[]){
Person P = new Person("P1");
P.setSalary(100);
P.printDetails();
}
}


A. public intpid;
B. private double salary;
C. intpersonID
D. double empSal
E. Person P = new Person("P1");

Which is the instance variable in the given code?public class Person{public intpid;private double salary;

Answers

Answer:

Person P is a new instance of Persons class

-- located in the main class

Pseudocode finding the sum of the number 12, 14, 16

Answers

Answer:

Pseudocode:

1. Initialize a variable named 'sum' and set it to 0.

2. Create an array named 'numbers' containing the numbers 12, 14, and 16.

3. Iterate over each number in the 'numbers' array.

  3.1 Add the current number to the 'sum' variable.

4. Print the value of 'sum'.

Alternatively, here's an example of pseudocode using a loop:

1. Initialize a variable named 'sum' and set it to 0.

2. Create an array named 'numbers' containing the numbers 12, 14, and 16.

3. Initialize a variable named 'index' and set it to 0.

4. Repeat the following steps while 'index' is less than the length of the 'numbers' array:

  4.1 Add the value at the 'index' position in the 'numbers' array to the 'sum' variable.

  4.2 Increment 'index' by 1.

5. Print the value of 'sum'.

Explanation:

1st Pseudocode:

1. In the first step, we initialize a variable called 'sum' and set it to 0. This variable will be used to store the sum of the numbers.

2. We create an array named 'numbers' that contains the numbers 12, 14, and 16. This array holds the numbers you want to sum.

3. We iterate over each number in the 'numbers' array. This means we go through each element of the array one by one.

3.1 In each iteration, we add the current number to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.

4. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.

2nd Pseudocode using a loop:

1. We start by initializing a variable called 'sum' and set it to 0. This variable will store the sum of the numbers.

2. Similar to the first pseudocode, we create an array named 'numbers' containing the numbers 12, 14, and 16.

3. We initialize a variable called 'index' and set it to 0. This variable will be used to keep track of the current index in the 'numbers' array.

4. We enter a loop that will repeat the following steps as long as the 'index' is less than the length of the 'numbers' array:

4.1: In each iteration, we add the value at the 'index' position in the 'numbers' array to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.

4.2: We increment the 'index' by 1 to move to the next position in the array.

5. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.

The int function can convert floating-point values to integers, and it performs rounding up/down as needed.

Answers

Answer:

False

Explanation:

The int() function is a built-in function found in Python3. This function can be used on floating-point values as well as strings with numerical values, etc. Once used it will convert the floating-point value into an integer whole value. However, it will always round the value down to the nearest whole number. This means that both 3.2 and 3.7 will return 3 when using the int function.

The int() does not perform rounding up/down of a float. It only print the

integer.

The int() function in python converts any specified number into an integer. It  

does not round the decimal up or down.

For example

x = 20.90

y = int(x)

print(y)

Normally the float number of x (20.90) is suppose to be rounded up to 21 but

python int() function only takes the whole number i.e. the integer number

The program above will print an integer of 20. There is no rounding up or

down for python int() function.

learn more: https://brainly.com/question/14702682?referrer=searchResults

Daiki is creating a database for a paint store. Each color of paint would have its own record which will include the color name price and size. The price of the paint will be in its own a) table b) file c) field d) format

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is c)field.

As we know that the feature of an entity is represented by its attribute in the database table. A database table is a set of records of different fields. Each field represents a row in a database table. Each field can contain a set of attributes related to an entity such as a paint color.

So the price of paint will be in its own field. Because there are different colors in the database table. Each color has its own record in form of a field. As you know that each field is a row in the database table. So, each row has the price of a paint color.

Other options are not correct because:

The table contains a list of fields and each field contains its own paint price. The format and file is something different and does not have any relation with the question scenario.

Answer:

C) Field

Explanation:

I took the test

Which of the following scenarios following to the category of internal computer crimes

Answers

Wheres the Scenarios?

Explanation:

Answer:

The four primary categories of computer crimes are internal computer crimes, telecommunications crimes, computer manipulation crimes, and traditional theft.

Explanation:

Elaborate me rale OF ICT in Education.​

Answers

Information and Communication Technology (ICT) plays a crucial role in transforming education by enhancing teaching and learning processes,

Elaborations on the role of ICT in education:

Access to Information and Resources: ICT provides students and educators with access to a vast amount of information and educational resources. Through the internet, digital libraries, and online databases, learners can access a wide range of educational materials, research articles, e-books, videos, and interactive content. This enables them to explore diverse topics, conduct research, and stay updated with the latest information in their respective fields.

Enhancing Teaching and Learning: ICT tools and technologies enhance teaching and learning experiences. Multimedia presentations, educational software, simulations, and virtual reality applications engage students and make learning interactive and dynamic. Online platforms and learning management systems provide educators with the ability to deliver course materials, assignments, and assessments in a structured and organized manner. This fosters active learning, critical thinking, and problem-solving skills among students.

Learn more about ICT at

https://brainly.com/question/13724249

#SPJ1

complete question

Elaborate on the role OF ICT in Education

What law protects published work?​

Answers

Answer:

Copyright

It protect published and not published work from other using their work.

Copyright

It protects published work so it dose not get duplicated

Write a program that will ask a user for how many numbers they would like to check. Then, using a for loop, prompt the user for a number, and output if that number is even or odd.


Benchmark:

Prompt the user to answer the question, "How many numbers do you need to check?"

Create and initialize two count variables - one for odd and one for even.

Based on the previous input, create a for loop that will run that exact number of times.

Prompt the user to "Enter number: "

If that number is even, output "[number] is an even number."

Update the even count variable.

Or else if the number is odd, output "[number] is an odd number."

Update the odd count variable.

Output "You entered [number] even number(s)."

Output "You entered [number] odd number(s)."

Please write the code in the Python language.

Answers

Answer:

num = int(input("How many numbers do you need to check? "))

even = 0

odd = 0

i = 1

while i <= num:

    userinput = int(input("Enter number: "))

    if userinput%2 == 0:

         print(str(userinput)+" is an even number")

         even = even + 1

    else:

         print(str(userinput)+" is an odd number")

         odd = odd + 1

    i = i + 1

       

print("You entered "+str(even)+" even number(s).")

print("You entered "+str(odd)+" even number(s).")

Explanation:

This line prompts user for the number of numbers to check

num = int(input("How many numbers do you need to check? "))

The next two lines initialize even and odd count to 0

even = 0

odd = 0

This line initialize the while loop counter to 1

i = 1

while i <= num:

This line prompts user for input

    userinput = int(input("Enter number: "))

The following if and else statements check for even and odd numbers, respectively  

  if userinput%2 == 0:

         print(str(userinput)+" is an even number")

         even = even + 1

    else:

         print(str(userinput)+" is an odd number")

         odd = odd + 1

    i = i + 1

       

The next two lines print number of even and odd numbers respectively

print("You entered "+str(even)+" even number(s).")

print("You entered "+str(odd)+" even number(s).")

Answer:

c = int(input("How many numbers do you need to check? "))

o = 0

e = 0

for i in range (c):

   i = int(input("Enter number: "))

   r = i % 2

   if (r == 1):

       print (str(i) + " is an odd number.")

       o=o+1

   if (r==0):

       print(str(i) + " is an even number.")

       e=e+1

print("You entered " + str(e) + " even number(s).")

print("You entered " + str(o) + " odd number(s).")

   

Explanation:

special purpose computer​

Answers

Answer:

Special-purpose computers are designed for one specific task or class of tasks and wouldn't be able to perform general computing tasks. For example, a router is a special-purpose computer designed to move data around a network, while a general-purpose computer can be used for this task, as well as many others.

utilities allow parents to set a variety of limits on their
children's internet usage.
Defragmentation
Firewall
Encryption
Parental control

Answers

Utilities allows parents to set a variety of limit on their children's internet usage.

These utilities are known as parental controls. These are the features that help in monitoring of persons activity on he net. Also then restricting the persons activity.

These programs or software block and filter the harmful sites. Put a time limit on the usage of internet. Recording and reviewing of the child internet history.

It is done to protect the child from the harmful impact of the internet. Like adult content, dark web, harmful person etc. Thus parental control is used.

To know more about the topic please click here.

https://brainly.com/question/27524451

Write a python program to calculate and print the electric bill for Ethiopian Electricity Corporation. (consumer name meter number(mno),last month reading(Imr)and current month reading(cmr) of 50 customers and calculate the net bill amounts as follows: Number of unit(Nou)=cmr-lmr If Nou200 then bill =Nou*2 tax=bill*0.15 netbill=bill+tax Print all the details in the bill for all customers​

Answers

The electric bill program illustrates the use of loops (i.e. iteration)

Loops are used to execute repetitive operations

The electric bill program in Python where comments are used to explain each line is as follows:

#This iteration shows that the process is repeated for 50 consumers

for i in range(50):

   #This gets input for the consumer name meter number

   mno = input("Consumer name meter number: ")

   #This gets input for last month reading

   lmr = int(input("Last month reading: "))

   #This gets input for current month reading

   cmr = int(input("Current month reading: "))

   #This calculates the number of units

   Nou = cmr - lmr

   #This calculates the bills

   bill = Nou*2

   #This calculates the tax

   tax = bill*0.15

   #This calculates the netbills

   netbill = bill+tax

   #This next four lines print the electric bills

   print("Number of units:",Nou)

   print("Bills:",bill)

   print("Tax:",tax)

   print("Netbill:",netbill)

Read more about loops at:

https://brainly.com/question/19344465

What are three advantages of using enterprise software in an organization?

A. It provides more security features that allow organizations to protect their data

B. It is available for use on both desktops and mobile devices.

C. It is an excellent platform for writing and revising personal memoirs.

D. It allows a large number of people to collaborate on a project.​

Answers

The three advantages of using enterprise software in an organization is that it provides more security features that allow organizations to protect their data.

The availability for use on desktops and mobile devices, which allows a large number of people to collaborate on a project, is also an advantage.

Therefore, using a enterprise software enables the integration of the strategy, enabling a more systematized management that is facilitated by the processing of data that supports decision-making.

Speed, collaboration and transparency are also improved, increasing the reliability and overall quality of organizational processes.

Learn more here:

https://brainly.com/question/1917506

Other Questions
Evaluate the function h(t)= t2 - 8t+12 at t=0. Then plot the point on the graph. Mr. Smith's Class PerformanceMean = 70ScoresThe statewide results of a standardized math test had a normal distribution and a mean of 70. Mr. Smith's students took the same test and the graph above depicts their results.. What does the mean score of Mr. Smith's class suggest about how well his students are performing relative to the state scores? What does the distribution of scores in Mr. Smith's class suggest about how well his students are performing relative to the state scores?Frequency You just made a model showing where energy storage molecules come from. Refer to your model and think back to what you know about how energy storage molecules are made and the factors that affect photosynthesis. Write a claim that can answer the new Investigation Question: What factors affect how many energy storage molecules producers are able to make? A charge of three discount points o a $120,000 loan equals; $450-$3,600-$4,500-$116,400 Please answer this question. Thank you and have a fruitful day. Your mom wants to replace the window shutters on your house with farmhouse shutters like pictured. Each window takes two shutters. The shutters measure 18 in x 36 in. Both shutters need a diagonal piece of wood cut to fit. What is the total amount of wood needed for each of the two diagonal pieces? Are you all in High school. I'm sorry if this isn't a subject question. I'm just wondering, And i'm an 8th grader. A 12 V car battery dies not so much because its voltage drops but because chemical reactions increase its internal resistance. A good battery connected with jumper cables can both start the engine and recharge the dead battery. Consider the automotive circuit of the figure(Figure_1). How much current could the good battery alone drive through the starter motor? Express your answer with the appropriate units. How much current is the dead battery alone able to drive through the starter motor? Express your answer with the appropriate units. With the jumper cables attached, how much current passes through the starter motor? Express your answer with the appropriate units. With the jumper cables attached, how much current passes through the dead battery? Express your answer with the appropriate units. With the jumper cables attached, in which direction current passes through the dead battery? raymond vernon's product life-cycle theory was based on the observation that for most of the Directions: Show all work in a neat and organized manner. Be sure to use correct notation and use equal signs appropriately. Clearly indicate your answers. Use the information in the paragraph below to complete problems 1-3. A widget manufacturer determines that the demand function for her widgets is p=1000x1/2, where x is the number of units demanded at a unit price p in dollars. The cost in dollars of producing x widgets is given by the function C(x)=10x+100x1/2+10,000. Find the marginal cost at x=100 and interpret the result. Hint: First find the marginal cost function. Use lineR regression to find the equation for the linear function that best fits this data. Round both numbers to two decimal places . Write your final answer in a form of an equation y=mx+bX 1. 2. 3. 4. 5. 6Y 77. 101. 118. 137. 158. 194 The individual level of analysis which focuses on the leader's relationship with individual followers is also called the ____ process. during the year, square9 sold 1,025 laptop computers. what was ending inventory using the lifo cost flow assumption? Based on the passage, which was NOT one of the student'sresponsibilities?A Producing drawings using traditional methodsBCDesigning mechanical modelsProducing drawings using engineering textbooksD Designing architectural models Janine is packing carrots. each large box holds 20 2-pound bags of carrots. if janine has 800 bags of carrots, how many boxes can she fill? a. 20 boxes b. 40 boxes c. 80 boxes d. 200 boxes Preventive maintenance is nothing more than keeping the equipment and machinery running. True False iwould greatly appreciate itGiven the following triangle, find the angle A using the appropriate sine or cosine 5.3 7 A=? law: 8.2 Given the following triangle, find the length of side x using the appropriate sine X 101 38 o A construction crew is lengthening a road. The road started with a length of 53 miles, and the crew is adding 2 miles to the road each day.Let L represent the total length of the road (in miles), and let D represent the number of days the crew has worked. Write an equation relating L to D. Then use this equation to find the total length of the road after the crew has worked 34 days. How did Harriet Beecher Stowe's Uncle Tom's Cabin support reform efforts? Name three types of non-wage factors that may influence an individuals choice of occupation.