The goal of enterprise resource planning (ERP) is to enable organizations to access business data easily and create and streamline the work processes of the organization efficiently. Therefore, D is the correct option for this question.
A form of software known as enterprise resource planning (ERP) is used by enterprises to manage routine business operations like accounting, purchasing, project management, compliance and risk management, and logistics management. Enterprise performance management software, which facilitates the organization in planning, preparing budgets, forecasting, and reporting financial results. These components are of full ERP suit version.
ERP systems enable the exchange of data between different departments of the organization and tie them all together. ERP systems ensure data integrity and avoid data duplication among different departments of the organization by gathering an organization's shared transactional data from several sources of the departments. ERP helps the organization to create, and streamline their work processes efficiently.
"
The complete question is given below:
Identify the goal of an enterprise resource planning (ERP) system.
A. To conduct collaborative live meetings or presentations over the Internet
B. To evaluate and select appropriate activities and projects for outsourcing
C. To define the customer's right to audit the provider's compliance with industry standards
D. To enable easy access to business data and create efficient, streamlined work processes
"
You can learn more about ERP at
https://brainly.com/question/28104535
#SPJ4
If an image has only 4 colors, how many bits are necessary to represent one pixel’s color in RGB?
Answer:
Form is the overall structure of the visual elements of a piece. Form can be represented by four categories: representational, objective, realistic, and naturalist.
Explanation:
brainliest
complete the expression so that userpoints is assigned with 0 if useritems is greater than 20 (second branch). otherwise, userpoints is assigned with 10 (first branch).
The expression provided is an example of a ternary operator, which is a type of operator that takes three operands.
userpoints = (useritems > 20 ? 0 : 10);In this case, the first operand is the comparison of useritems being greater than 20, the second operand is the value that should be assigned to userpoints if the comparison is true (in this case 0), and the third operand is the value that should be assigned to userpoints if the comparison is false (in this case 10). The expression 'userpoints = (useritems > 20 ? 0 : 10);' is complete and assigns 0 to userpoints if useritems is greater than 20, otherwise it assigns 10 to userpoints.
Learn more about programming: https://brainly.com/question/26134656
#SPJ4
Jerry purchased 25 dozens of eggs. He used 6 eggs to bake 1 cake. How
many similar cakes can Jerry bake with the number of eggs he purchased?
Answer:
50
Explanation:
He bought 25 dozens of eggs:
25 (12) = 300
He used 6 eggs to make 1 cake, so:
300 eggs/6 eggs per cake = 50 cakes
Arrange the sections according to their order of appearance in the SRS document.
Based on the information given, the order of appearance will be Overview, Assumptions, Product functions, General Constraints, and References.
What is a SRS document?A software requirement specification document simply means the document that describes what the software will do and how it'll be expected to preform the work.
The order of appearance will be Overview, Assumptions, Product functions, General Constraints, and References. These are vital for the overall function of the program.
Learn more about the SRS document on:
https://brainly.com/question/22895405
Answer:
Assumptions, Product functions, General Constraints, and References
Explanation:
Instructions
Click the links to open the resources below. These resources will help you complete the assignment. Once you have created your file(s) and are ready to upload your assignment, click the Add Files button below and select each file from your desktop or network folder. Upload each file separately.
Your work will not be submitted to your teacher until you click Submit.
The assignment is about Telephone, internal combustion engine, and electrical light.
What is file?A file is a computer system container for storing data. Files used in computers are similar in characteristics to paper documents used in libraries and office files. There are different types of files like text files, data files, folders, binary and graphic files and these different types of files store different types of data. A computer's operating system can store files on optical discs, hard drives, or other types of storage devices.
In most operating systems, a file must have a unique name within a specific directory. However, when creating a file name, some characters are considered illegal and therefore cannot be used. A file name consists of a name with an extension, also known as a file extension. The file extension is the two to four characters after the period of the full file name.
To learn more about file, refer;
https://brainly.com/question/29055526
#SPJ4
Java question
If the user wants to enter one character what statement you use?
1- next()?
2-next(0)?
3-CharAt(0).
4-next().charAt(0).
Answer:
To be honest why would you want to enter one character. Anyways the answer is option 4
Create pseudocode that could be used as a blueprint for a program that would do the following: An employer wants you to create a program that will allow her to enter each employee’s name, hourly rate of pay, number of hours worked in one week, overtime pay rate, payroll deductions (such as medical insurance, savings, etc.), and tax rate. The program should output the employee’s gross pay (before taxes and deductions) and net pay (after taxes and deductions) for each employee for one week.
Answer:
START LOOP FOR EACH EMPLOYEE:
INPUT employee’s name, hourly rate of pay, number of hours worked, overtime pay rate, payroll deductions, tax rate
SET gross pay = (hourly rate of pay x *weekly hours) + (overtime pay rate x (number of hours worked - *weekly hours))
PRINT gross pay
SET net pay = gross pay - (payroll deductions + (gross pay * tax rate/100 ))
PRINT net pay
END LOOP
* weekly hours (how many hours an employee needs to work to earn overtime pay rate) is not given in the question
Explanation:
Create a loop that iterates for each employee
Inside the loop, ask for name, hourly rate, number of hours worked, overtime pay rate, payroll deductions, tax rate. Calculate the gross pay and print it. Calculate the net pay and print it
Every workplace should have an emergency plan of action.
Please select the best answer from the choices provided
T
F
It is true that every workplace should have an emergency action plan.
What is an emergency action plan (EAP)?
A written document required by specific OSHA standards is an emergency action plan (EAP). [29 CFR 1910.38(a)] An EAP's purpose is to facilitate and organize employer and employee actions in the event of a workplace emergency.
During an emergency, well-developed emergency plans and proper employee training (so that employees understand their roles and responsibilities within the plan) will result in fewer and less severe employee injuries and less structural damage to the facility.
A poorly prepared plan will almost certainly result in a disorganized evacuation or emergency response, causing confusion, injury, and property damage.
So, the correct answer to the question is True (T).
To know more about the emergency action plan, visit: https://brainly.com/question/3238467
#SPJ1
how can a computer be used by a manager of a shopping mall
Answer:
- used to look at security cameras
- used to buy supplies for the mall (maintenance)
- billing
Answer:
With growing square footage of shopping malls, however, comes the challenge of managing these super structures. Shopping mall managers need to take care of all tenant and building services, including physical security hardware of both the individual tenants’ spaces, the general facility and common areas.
What are some of the security and access control challenges unique to shopping centers and malls?
Multiple tenants across multiple buildings. Access for tenants with their own set of employees needs to be managed efficiently.
Tenant turnover. When a tenant terminates his lease, his ability to access the space should be completely revoked. Mall management must be able to do this in a timely manner for the security of the shared property and for the safety of the next tenant.
Expansion, reduction and relocation of tenants within facilities. While this does not entail revocation of access, mall management must be able to provide smooth transition, in terms of access control to the new space, and denial of access to the previously-occupied space where a new tenant will be moving in.
Security for Shared Entrances and Spaces. Managing access privileges for shared facilities like that in a mall can be challenging. For instance, if a tenant in a mall hires or fires an employee, mall management needs to be informed so they can update access privileges to common entrances and shared spaces. This also applies for maintenance workers, cleaning crews and the like. An efficient access control system allows mall management to control access privileges with ease.
Explanation:
Medical assistant, Jackie, was downloading some patient information on cerebral palsy from the Internet. While downloading, Jackie noticed the computer was working slower than usual. When Jackie clicked on a web site that she needed to review, the computer would not take her to the designated website. Instead, the computer took her to an alternative site. Jackie soon noticed that even when she was working offline using a word processing software program, the computer was acting up. When she went to
the medical software, she could not bring up patient account information.
Question:
What happened and what should Jackie do?
The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious app obstructing her.
What is a system hack?System hacking is known to be when one's computer is said to be compromise in regards to computer systems and software.
Note that The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious app obstructing her.
Learn more about system hack from
https://brainly.com/question/13068599
#SPJ1
Driving is expensive. Write a program (in Python) with a car's miles/gallon and gas dollars/gallon (both floats) as input, and output the gas cost for 20 miles, 75 miles, and 500 miles.
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f} {:.2f} {:.2f}'.format(your_value1, your_value2, your_value3))
x=float(input("How many miles can your vehicle travel on 1 gallon of gasoline?: "))
y=float(input("How much does 1 gallon of gasoline cost?: "))
print('20 miles: {:.2f}$\n75 miles: {:.2f}$\n500 miles: {:.2f}$'.format((20/x)*y, (75/x)*y, (500/x)*y))
Someone help me for about how to avoid online scams please I need help no trolls
Answer:
1. (for emails) Block spam messages.
2. Look at who sent whatever it is and make sure it is the exact email for the brand.
3. If someone is putting a lot of emojis in a comment or somthing its fake.
4. Make sure to read the fine print.
5. Do not giveaway personal information like zip code, address, social security number.
$
Type the correct answer in the box. Spell all words correctly.
What file format was created for video by Microsoft?
_______was created by Microsoft.
ANYONE NOW!!
Answer:
Windows media video
Explanation:
it is the most recognizable video compression format within the WMV family
Answer:
AVI
Explanation:
AVI is defined by Microsoft. The avi file format is the most common format for audio and video data on a computer.
I got it right on the test!
You would like the cell reference in a formula to remain the same when you copy
it from cell A9 to cell B9. This is called a/an _______ cell reference.
a) absolute
b) active
c) mixed
d) relative
Answer:
The answer is:
A) Absolute cell reference
Explanation:
An absolute cell reference is used in Excel when you want to keep a specific cell reference constant in a formula, regardless of where the formula is copied. Absolute cell references in a formula are identified by the dollar sign ($) before the column letter and row number.
Hope this helped you!! Have a good day/night!!
Answer:
A is the right option absoluteIn most cases, the word "software" is interchangeable with the word
Answer:
In most cases, the word "software" is interchangeable with the word "program"
Explanation:
The terms software and program are used interchangeably as they often refer to the same thing in daily usage.
The are two schools of ____________ are Symmetry and Asymmetry.
The two schools of design that encompass symmetry and asymmetry are known as symmetrical design and asymmetrical design.
Symmetrical design is characterized by the balanced distribution of visual elements on either side of a central axis. It follows a mirror-like reflection, where the elements on one side are replicated on the other side, creating a sense of equilibrium and harmony.
Symmetrical designs often evoke a sense of formality, stability, and order.
On the other hand, asymmetrical design embraces a more dynamic and informal approach. It involves the intentional placement of visual elements in an unbalanced manner, without strict adherence to a central axis.
Asymmetrical designs strive for a sense of visual interest and tension through the careful juxtaposition of elements with varying sizes, shapes, colors, and textures.
They create a more energetic and vibrant visual experience.
Both symmetrical and asymmetrical design approaches have their merits and are employed in various contexts. Symmetry is often used in formal settings, such as architecture, classical art, and traditional graphic design, to convey a sense of elegance and tradition.
Asymmetry, on the other hand, is commonly found in contemporary design, modern art, and advertising, where it adds a sense of dynamism and creativity.
In conclusion, the schools of symmetry and asymmetry represent distinct design approaches, with symmetrical design emphasizing balance and order, while asymmetrical design embraces a more dynamic and unbalanced aesthetic.
For more such questions on symmetry,click on
https://brainly.com/question/31547649
#SPJ8
PLEASE HELP
Find five secure websites. For each site, include the following:
the name of the site
a link to the site
a screenshot of the security icon for each specific site
a description of how you knew the site was secure
Use your own words and complete sentences when explaining how you knew the site was secure.
The name of the secure websites are given as follows:
Each of the above websites had the security icon on the top left corner of the address bar just before the above domain names.
What is Website Security?The protection of personal and corporate public-facing websites from cyberattacks is referred to as website security.
It also refers to any program or activity done to avoid website exploitation in any way or to ensure that website data is not accessible to cybercriminals.
Businesses that do not have a proactive security policy risk virus spread, as well as attacks on other websites, networks, and IT infrastructures.
Web-based threats, also known as online threats, are a type of cybersecurity risk that can create an unwanted occurrence or action over the internet. End-user weaknesses, web service programmers, or web services themselves enable online threats.
Learn more about website security:
https://brainly.com/question/28269688
#SPJ1
what is computer hardware
Computer hardware refers to the physical components of a computer system that can be seen and touched. It encompasses all the tangible parts that make up a computer, enabling it to function and perform various tasks. Hardware includes devices such as the central processing unit (CPU), memory (RAM), storage devices (hard drives, solid-state drives), input devices (keyboard, mouse), output devices (monitor, printer), and other peripheral devices (speakers, scanners, etc.).
These hardware components work together to execute and manage data and instructions within a computer system. The CPU acts as the brain of the computer, performing calculations and executing instructions. Memory provides temporary storage for data and instructions that the CPU can quickly access. Storage devices store data in a more permanent manner, allowing it to be retained even when the computer is turned off.
Input devices enable users to input data and commands into the computer, while output devices display or present processed information to the user. Peripheral devices expand the capabilities of the computer system, providing additional functionalities and connectivity options.
Computer hardware is essential for the functioning of a computer and determines its processing power, storage capacity, and overall performance. It is complemented by software, which provides the instructions and programs necessary to utilize the hardware effectively. Together, hardware and software form the foundation of modern computer systems.
For more such questions on components, click on:
https://brainly.com/question/28351472
#SPJ11
Which is the instance variable in the given code?
public class Person{
public intpid;
private double salary;
public Person (intpersonID){
pid = personID;
}
public void setSalary(double empSal){
salary = empSal;
}
public void printDetails(){
System.out.println("id : " + pid );
System.out.println("salary :" + salary);
}
public static void main(String args[]){
Person P = new Person("P1");
P.setSalary(100);
P.printDetails();
}
}
A. public intpid;
B. private double salary;
C. intpersonID
D. double empSal
E. Person P = new Person("P1");
Answer:
Person P is a new instance of Persons class
-- located in the main class
Pseudocode finding the sum of the number 12, 14, 16
Answer:
Pseudocode:
1. Initialize a variable named 'sum' and set it to 0.
2. Create an array named 'numbers' containing the numbers 12, 14, and 16.
3. Iterate over each number in the 'numbers' array.
3.1 Add the current number to the 'sum' variable.
4. Print the value of 'sum'.
Alternatively, here's an example of pseudocode using a loop:
1. Initialize a variable named 'sum' and set it to 0.
2. Create an array named 'numbers' containing the numbers 12, 14, and 16.
3. Initialize a variable named 'index' and set it to 0.
4. Repeat the following steps while 'index' is less than the length of the 'numbers' array:
4.1 Add the value at the 'index' position in the 'numbers' array to the 'sum' variable.
4.2 Increment 'index' by 1.
5. Print the value of 'sum'.
Explanation:
1st Pseudocode:
1. In the first step, we initialize a variable called 'sum' and set it to 0. This variable will be used to store the sum of the numbers.
2. We create an array named 'numbers' that contains the numbers 12, 14, and 16. This array holds the numbers you want to sum.
3. We iterate over each number in the 'numbers' array. This means we go through each element of the array one by one.
3.1 In each iteration, we add the current number to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.
4. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.
2nd Pseudocode using a loop:
1. We start by initializing a variable called 'sum' and set it to 0. This variable will store the sum of the numbers.
2. Similar to the first pseudocode, we create an array named 'numbers' containing the numbers 12, 14, and 16.
3. We initialize a variable called 'index' and set it to 0. This variable will be used to keep track of the current index in the 'numbers' array.
4. We enter a loop that will repeat the following steps as long as the 'index' is less than the length of the 'numbers' array:
4.1: In each iteration, we add the value at the 'index' position in the 'numbers' array to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.
4.2: We increment the 'index' by 1 to move to the next position in the array.
5. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.
The int function can convert floating-point values to integers, and it performs rounding up/down as needed.
Answer:
False
Explanation:
The int() function is a built-in function found in Python3. This function can be used on floating-point values as well as strings with numerical values, etc. Once used it will convert the floating-point value into an integer whole value. However, it will always round the value down to the nearest whole number. This means that both 3.2 and 3.7 will return 3 when using the int function.
The int() does not perform rounding up/down of a float. It only print the
integer.
The int() function in python converts any specified number into an integer. It
does not round the decimal up or down.
For example
x = 20.90
y = int(x)
print(y)
Normally the float number of x (20.90) is suppose to be rounded up to 21 but
python int() function only takes the whole number i.e. the integer number
The program above will print an integer of 20. There is no rounding up or
down for python int() function.
learn more: https://brainly.com/question/14702682?referrer=searchResults
Daiki is creating a database for a paint store. Each color of paint would have its own record which will include the color name price and size. The price of the paint will be in its own a) table b) file c) field d) format
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is c)field.
As we know that the feature of an entity is represented by its attribute in the database table. A database table is a set of records of different fields. Each field represents a row in a database table. Each field can contain a set of attributes related to an entity such as a paint color.
So the price of paint will be in its own field. Because there are different colors in the database table. Each color has its own record in form of a field. As you know that each field is a row in the database table. So, each row has the price of a paint color.
Other options are not correct because:
The table contains a list of fields and each field contains its own paint price. The format and file is something different and does not have any relation with the question scenario.
Answer:
C) Field
Explanation:
I took the test
Which of the following scenarios following to the category of internal computer crimes
Wheres the Scenarios?
Explanation:
Answer:
The four primary categories of computer crimes are internal computer crimes, telecommunications crimes, computer manipulation crimes, and traditional theft.
Explanation:
Elaborate me rale OF ICT in Education.
Information and Communication Technology (ICT) plays a crucial role in transforming education by enhancing teaching and learning processes,
Elaborations on the role of ICT in education:Access to Information and Resources: ICT provides students and educators with access to a vast amount of information and educational resources. Through the internet, digital libraries, and online databases, learners can access a wide range of educational materials, research articles, e-books, videos, and interactive content. This enables them to explore diverse topics, conduct research, and stay updated with the latest information in their respective fields.
Enhancing Teaching and Learning: ICT tools and technologies enhance teaching and learning experiences. Multimedia presentations, educational software, simulations, and virtual reality applications engage students and make learning interactive and dynamic. Online platforms and learning management systems provide educators with the ability to deliver course materials, assignments, and assessments in a structured and organized manner. This fosters active learning, critical thinking, and problem-solving skills among students.
Learn more about ICT at
https://brainly.com/question/13724249
#SPJ1
complete question
Elaborate on the role OF ICT in Education
What law protects published work?
Answer:
Copyright
It protect published and not published work from other using their work.
Write a program that will ask a user for how many numbers they would like to check. Then, using a for loop, prompt the user for a number, and output if that number is even or odd.
Benchmark:
Prompt the user to answer the question, "How many numbers do you need to check?"
Create and initialize two count variables - one for odd and one for even.
Based on the previous input, create a for loop that will run that exact number of times.
Prompt the user to "Enter number: "
If that number is even, output "[number] is an even number."
Update the even count variable.
Or else if the number is odd, output "[number] is an odd number."
Update the odd count variable.
Output "You entered [number] even number(s)."
Output "You entered [number] odd number(s)."
Please write the code in the Python language.
Answer:
num = int(input("How many numbers do you need to check? "))
even = 0
odd = 0
i = 1
while i <= num:
userinput = int(input("Enter number: "))
if userinput%2 == 0:
print(str(userinput)+" is an even number")
even = even + 1
else:
print(str(userinput)+" is an odd number")
odd = odd + 1
i = i + 1
print("You entered "+str(even)+" even number(s).")
print("You entered "+str(odd)+" even number(s).")
Explanation:
This line prompts user for the number of numbers to check
num = int(input("How many numbers do you need to check? "))
The next two lines initialize even and odd count to 0
even = 0
odd = 0
This line initialize the while loop counter to 1
i = 1
while i <= num:
This line prompts user for input
userinput = int(input("Enter number: "))
The following if and else statements check for even and odd numbers, respectively
if userinput%2 == 0:
print(str(userinput)+" is an even number")
even = even + 1
else:
print(str(userinput)+" is an odd number")
odd = odd + 1
i = i + 1
The next two lines print number of even and odd numbers respectively
print("You entered "+str(even)+" even number(s).")
print("You entered "+str(odd)+" even number(s).")
Answer:
c = int(input("How many numbers do you need to check? "))
o = 0
e = 0
for i in range (c):
i = int(input("Enter number: "))
r = i % 2
if (r == 1):
print (str(i) + " is an odd number.")
o=o+1
if (r==0):
print(str(i) + " is an even number.")
e=e+1
print("You entered " + str(e) + " even number(s).")
print("You entered " + str(o) + " odd number(s).")
Explanation:
special purpose computer
Answer:
Special-purpose computers are designed for one specific task or class of tasks and wouldn't be able to perform general computing tasks. For example, a router is a special-purpose computer designed to move data around a network, while a general-purpose computer can be used for this task, as well as many others.
utilities allow parents to set a variety of limits on their
children's internet usage.
Defragmentation
Firewall
Encryption
Parental control
Utilities allows parents to set a variety of limit on their children's internet usage.
These utilities are known as parental controls. These are the features that help in monitoring of persons activity on he net. Also then restricting the persons activity.
These programs or software block and filter the harmful sites. Put a time limit on the usage of internet. Recording and reviewing of the child internet history.
It is done to protect the child from the harmful impact of the internet. Like adult content, dark web, harmful person etc. Thus parental control is used.
To know more about the topic please click here.
https://brainly.com/question/27524451
Write a python program to calculate and print the electric bill for Ethiopian Electricity Corporation. (consumer name meter number(mno),last month reading(Imr)and current month reading(cmr) of 50 customers and calculate the net bill amounts as follows: Number of unit(Nou)=cmr-lmr If Nou200 then bill =Nou*2 tax=bill*0.15 netbill=bill+tax Print all the details in the bill for all customers
The electric bill program illustrates the use of loops (i.e. iteration)
Loops are used to execute repetitive operations
The electric bill program in Python where comments are used to explain each line is as follows:
#This iteration shows that the process is repeated for 50 consumers
for i in range(50):
#This gets input for the consumer name meter number
mno = input("Consumer name meter number: ")
#This gets input for last month reading
lmr = int(input("Last month reading: "))
#This gets input for current month reading
cmr = int(input("Current month reading: "))
#This calculates the number of units
Nou = cmr - lmr
#This calculates the bills
bill = Nou*2
#This calculates the tax
tax = bill*0.15
#This calculates the netbills
netbill = bill+tax
#This next four lines print the electric bills
print("Number of units:",Nou)
print("Bills:",bill)
print("Tax:",tax)
print("Netbill:",netbill)
Read more about loops at:
https://brainly.com/question/19344465
What are three advantages of using enterprise software in an organization?
A. It provides more security features that allow organizations to protect their data
B. It is available for use on both desktops and mobile devices.
C. It is an excellent platform for writing and revising personal memoirs.
D. It allows a large number of people to collaborate on a project.
The three advantages of using enterprise software in an organization is that it provides more security features that allow organizations to protect their data.
The availability for use on desktops and mobile devices, which allows a large number of people to collaborate on a project, is also an advantage.
Therefore, using a enterprise software enables the integration of the strategy, enabling a more systematized management that is facilitated by the processing of data that supports decision-making.
Speed, collaboration and transparency are also improved, increasing the reliability and overall quality of organizational processes.
Learn more here:
https://brainly.com/question/1917506