A start-up software consultancy company is considering adopting an enterprise system. What is a possible disadvantage of using an enterprise system that the company should consider?


A.
bad project planning
B.
high cost of initial investment
C.
high inventory cost
D.
reduced data redundancy

Answers

Answer 1

reduced data redundancy

Answer: D


Related Questions



A pseudocode program is started below that asks the user for input and stores the value in a variable. Continue writing pseudocode to accomplish this task:


If the hour is within the school day (8 to 15) then display “Nice to see you!”, Otherwise, display “It’s time to go home!


DISPLAY (“Enter the hour of day (0-23)”)

hour <- INPUT ()

Answers

Answer:

IF hour >= 8 AND hour <= 15

     DISPLAY("Nice to see you!")

ELSE

    DISPLAY("It's time to go home!")

END IF

Explanation:

We check the value entered, and stored in the variable 'hour'.

If the value of 'hour' is greater or equal to 8, but lower or equal 15, we wish the student welcome.  Otherwise, we tell him to go home.  Then end of the IF structure.

This fragment of code would be placed below the one provided in the question statement.

Your mother wants to purchase a large hard drive for her computer and asks you to see what type of drive interface she has. Her computer has a gray ribbon cable that encases 40 pins what type of drive does she have

Answers

Answer: IDE Hard Drive

Explanation:

A gray ribbon that encases forty pins is a IDE cable, used to connect IDE devices to the computer.

IDE Cables come in two different variants, 34-pin connector, which is normally connected to floppy disks, and the 40-pin, which is used to connect the Hard Drive and Optical Drives.

There are different pin counts, but mainly you would want to know the 34-pin and 40-pin IDE Cables.

A IDE hard drive is basically the same as a PATA Hard Drive.

Chris is deciding which college he will attend in the fall. He was accepted to two schools – his dream university and a smaller local school that offered him a full basketball scholarship. Chris accepts the scholarship from the small local school. Chris’s decision was likely based on emotion logic Syndrome E empathy

Answers

Answer:

Logic

Explanation:

I took the FLVS test :)

Chris was accepted to two schools – his dream university and a smaller local school that offered him a full basketball scholarship. Chris accepts the scholarship from the small local school. Chris’s decision was likely based on Logic.

What is a scholarship?

A scholarship is a type of money given to learners for additional education. Scholarships are typically given out based on a number of factors, including academic achievement, inclusion and diversity athletic ability, and socioeconomic need.

The institution Chris will visit in the fall is now up for debate. He received acceptance letters from two institutions: his ideal college and a smaller regional university that gave him a full sports scholarship. Chris accept the scholarship offered by the tiny neighborhood school. By nature, logic is a style of decision-making that seeks the best outcome through the use of solid and logical reasoning.

Learn more about scholarship, here:

https://brainly.com/question/22685530

#SPJ5

ASAP....Rough sketches of what individual screens in an app will look like are called a0.

Answers

Answer:

Heyy your answer is A website wire frame

Explanation:

A website wire frame, also known as a page schematic or screen blueprint, is a visual guide that represents the skeletal framework of a website. Wire frames are created for the purpose of arranging elements to best accomplish a particular purpose. The purpose is usually being informed by a business objective and a creative idea. The wire frame depicts the page layout or arrangement of the website’s content, including interface elements and navigational systems, and how they work together. The wire frame usually lacks typographic style, color, or graphics, since the main focus lies in functionality, behavior, and priority of content. In other words, it focuses on what a screen does, not what it looks like. Wire frames can be pencil drawings or sketches on a whiteboard, or they can be produced by means of a broad array of free or commercial software applications. Wire frames are generally created by business analysts, user experience designers, developers, visual designers, and by those with expertise in interaction design, information architecture and user research.

Hope this helps!!

Which of the following is an example of Syndrome E in action?

Dan stood up for a freshman who was being bullied by his classmates.
Clarisa decided to buy the new shoes all her friends are raving about.
Jared joined in a group text making fun of an unpopular classmate.
Alice posted a makeup tutorial showing how to perform the latest beauty fad.

Answers

Final answer:

Syndrome E is exemplified by Jared engaging in a group text mocking an unpopular classmate, showing how group pressure can lead to negative behaviors.

Explanation:

The example of Syndrome E in action would be Jared joining in a group text making fun of an unpopular classmate. Syndrome E, also identified as a kind of group behavior, occurs when individuals conform to the actions of a group, often leading to negative or harmful outcomes.

In this case, the behavior involves participating in the collective ridicule and ostracization of an individual, which can be emotionally damaging. This correlates with the broader concept of collective behavior, where individual responsibilities and morals are often subdued in favor of group dynamics and pressure.

Final answer:

The correct answer is "Jared joining a group text to make fun of an unpopular classmate" reflects collective behavior but is not an example of Syndrome E or cultural syndromes like susto or anorexia nervosa.

Explanation:

The concept of Syndrome E in the question seems to refer to collective behavior driven by certain social or cultural factors. However, the provided examples do not fit with Syndrome E but rather exhibit typical social behaviors. Instead, let's consider the notion of cultural syndromes, which are defined as patterns of behavior and experience that are culturally bound. For instance, cultural syndromes such as susto, experienced in Latino societies, are brought on by witnessing traumatic events, resulting in symptoms ranging from nervousness to depression. Another example is anorexia nervosa, a culture-bound syndrome more prevalent in societies with specific beauty standards.

When examining the options provided, none directly reflects a cultural syndrome. However, Jared's action of joining in a group text making fun of an unpopular classmate exhibits a form of collective behavior that mirrors the dynamic of in-groups and out-groups, where exclusion and torment can occur due to group dynamics. This aligns with question 3 related to collective behavior.

The only internet service used more frequently than the web is ___, which is a system for exchanging messages through a computer network.

Answers

the only Internet service used more frequently than the web is e-mail

E-Mail is the only popular one I can think of that could possibly be more popular than the web.

Luke created an electronic address book in Excel. When two of his friends got married, Luke combined their names and addresses into one row, leaving him with a blank row. How can he permanently delete this extra row?
a.
Hide the empty row.
b.
Change the row’s color to black
c.
Right click the row and select Shift Cells Down
d.
Delete the empty row using the Delete Sheet Rows button.


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

D. Delete the empty row...

Explanation:

The question asks how to permanently delete the row. This option is the only one that deletes the row.

What is the most common form of renewable energy used to generate electricity

Answers

i think that it’s either sunlight or solar energy

Which of the following evaluates to the variable x rounded to two decimal places?

A. round(x, 2)
B. round(2, x)
C. round(x), 2
D. round(2), x

Answers

Answer:

A. round(x, 2)

Explanation:

It depends on the specific language you're using, but in most language it will follow the syntax round(x, 2).

In the first parameter you enter the value to be rounded (in this case 'x'), and in the second parameter you indicate how many decimals you want to have it rounded to (in this case '2').

Let's suppose we have number 34,54924 as x:

round(x,0) = 35

round(x,1) = 34,5

round(x,2) = 34,55

round(x,3) = 34,549

Which statement does not describe a guideline for presentation content development? Don't use more than four bullet points on a slide. Include as much detail on slides as you have room for. Limit the number of lines of text on your slide to seven or less. Use a font size of at least 24 point.

Answers

Answer:

Include as much detail on slides as you have room for.

Explanation:

It contradicts some of the other points, if you add too much the slide will look overcrowded and be hard to read.

Answer:

the answer is d

How many bytes are in 1 kilobyte of storage

Answers

Answer:

1000

Explanation I SEARCHED IT Up

Which of the following is not an arithmetic operation?
A. a *= 20;
B. a /= 30;
C. a %= 40;
D. a != 50;

Answers

D. a !=50 is a condition and therefore it is not an arithmetic operation.

Let me know if you have any questions.

Requirement types discussed during software development include _____.
A) functional and color scheme
B) nonfunctional and code style
C) constraint and nonfunctional
D) fashionable and functional.

Answers

Final answer:

Requirement types in software development include functional, nonfunctional, and constraints. These requirements define what the software will do and how it should perform, as well as any development limitations. The development process may revisit requirements due to new features or bugs.

Explanation:

Requirement types discussed during software development include functional and nonfunctional requirements, as well as constraints. Functional requirements refer to what the software should do, including tasks, features, and capabilities. Nonfunctional requirements describe how the software should perform, covering aspects such as security, reliability, and usability. Constraints are limitations or conditions the development must adhere to, like specific technologies or legal regulations.

During the software development cycle, new ideas, bug fixes, and feature requests can trigger the requirements phase to begin anew, following a sort of waterfall effect where different parts of the project might be in different phases at the same time. Additionally, structural decisions such as adopting Architectural Patterns like the Model View Controller (MVC) and deciding which criteria are most important for a design's success are critical steps in the development process.

By developing a(n) _____, a business owner can launch program in a web browser. spreadsheet CAD software Java Applet music application

Answers

The correct answer is "Java Applet"

Hope this helps! : )

Answer:

Java Applet

Explanation:

By developing a(n)Java Applet , a business owner can launch program in a web browser.

Description: A Java applet was a small application written in the Java programming language, or another programming language that compiles to Java bytecode, and delivered to users in the form of Java bytecode.

Which of these factors can adversely affect a computer performancea: cold b: heat c: moisture d: dryness

Answers

Answer:

B Heat and C.moisture

Explanation:

If your device over heats it can cause damage the same goes for moisture.

over heating and moisture

From the perspective of the prosecution, the safest legal means of obtaining incriminating documents from a suspect is by: a. Subpoena duces tectum b. A search warrant c. Having an informant steal the documents d. Surreptitiously copying the documents

Answers

Answer:

a. Subpoena duces tectum

Explanation:

Options C (an informant steal the documents) and D (discrete copy of the documents) would be considered illegal and/or inadmissible in most places, so you should avoid these.

Options A (subpoena) and B (search warrant) are usually issued by a judge after considerations, so they are both legal ways to obtain something.

In a subpoena duces tecum, the court orders an individual (or a moral person) to produce (usually very specific) documents to court or face penalty.

A search warrant is executed by law enforcement officials who are seeking information to help in their investigation, usually not highly specific (not 'search for a copy of the April 10 minutes of the meeting.').

Final answer:

The safest legal means of obtaining incriminating documents from a suspect, according to the prosecution, is by obtaining a search warrant, as it is authorized by a judge and ensures constitutional protections.

Explanation:

From the perspective of the prosecution, the safest legal means of obtaining incriminating documents from a suspect is by a search warrant. This is because a search warrant is a legal document, signed by a judge, that authorizes law enforcement officials to search and/or seize persons or property. This ensures that the method of obtaining the evidence complies with the constitutional protections against unreasonable searches and seizures. On the other hand, options such as having an informant steal the documents or surreptitiously copying the documents could lead to the evidence being deemed inadmissible as they may violate privacy rights and due process provisions. A subpoena duces tecum, while also a legal mechanism, typically compels someone to produce documents or evidence in a court of law or a legal setting and might not be as immediate or enforceable as a search warrant in the collection of evidence.


Which Is The Best Website Designer In Delhi/NCR? How To Find The Cheapest But The Best Website Designing Company In Delhi?

Answers

Explanation:

Top 8 Web Design & Development Companies In Delhi

1 B2B Infosoft. ...

2 CSSChopper. ...

3 Artattackk Visit Website9 VoteE.

4 Dreamsmedia Visit Website9 VoteE.

5 Sparx IT Solutions Sparx IT Solutions is a web & app development company that creates user-centric websites. ...

6 Cyberworx Visit Website9 VoteE.

7 360 Website Design Visit Website9 VoteE.

8 Tranciscolabs.

hope this helps

What is a geotag?


It gives the geographic location of the user.


It helps users find a location based on pictures.


It helps to give the geographic location of photos.


It allows a user to get updates about photos from specific geographic locations.

Answers

Answer:

It helps to give the geographic location of photos.

Explanation:

A geotag is added into the photography information when it's taken.  That info is part of the EXIF information of a photo that lists a bunch of data related to the photo, like the camera brand, model, the aperture, the speed, the ISO, and so on.

That's assuming the GPS info is available of course, but if it's taken by a phone, it has the GPS info.  Most mid-range and upper-range cameras have it too.

That information is used for example by Google Maps to present photos taken at a specific location.

Answer:

c it helps give the geographic location of photos

Explanation:

A new coffee shop has problems maintaining inventory. It approaches a software developing team for a program to cater to their specific needs. The team starts by defining the problem. What is the programming process that determines the exact purpose of the program?
____________is the process in which the software development team compiles information to help determine the final product.

Answers

Specifications is the process in which the software development team compiles information to help determine the final productthe software development team compiles information to help determine the final product.

Answer: Specifications

I am not sure if this is the right answer

Requirement gathering (Planning) and Analysis is the process in which the software development team compiles information to help determine the final product.

What is Requirement gathering (Planning) and Analysis?

The first step of the Software Development life cycle is when business requirements are collected. This stage assists managers and stakeholders in determining needs such as how the system will function. These are the broad questions that must be addressed in order to identify the ultimate result.

The method by which the software development team gathers information to assist establish the final product is known as specifications. The software development team gathers data to aid in the creation of the final product.

Therefore, the process through which the software development team gathers information to assist select the final product is known as requirement collecting (planning).

To learn more about Requirement gathering and Analysis, refer to the link:

https://brainly.com/question/11989933

#SPJ2

What two tools can be used to disable a service and to give a list of all currently running services, respectively?

Answers

I can only think of one tool, which is task manager. Hope this helps (somewhat, at least)!

The energy used by an appliance which operates at 240 volts at 15 amp for 4 hr. is A. 0.92 kwhr. B. 3.45 kwhr. C. 14.4 kwhr. D. 60.0 kwhr

Answers

Answer:

C. 14.4 kwhr.

Explanation:

To calculate the energy used by appliance first calculate the power. The formulae for calculating power(P) is [tex] P= I \times V[/tex], where V stands for voltage and I stands for current.

In the given problem,  V = 240 volts and I = 15 amp. Therefore,

[tex]P=240 \times 15 =3600\ watt(w) = 3.6\ kw[/tex]

Now, formulae for calculating energy used i.e. work(W) is [tex]W = P\times t[/tex], where t is the time.

In the given question time is 4 hr. Therefore energy used will be,

Energy used (W) = [tex]3.6\times4 =14.4\ kwhr[/tex].

Your ipad has an application that will not stop running. what feature/tool can you use to stop it? kill treason task manager force quit

Answers

you could force quit

You would force quit on an iPad.

Why are audio files compressed?

Compressed audio files are protected from being edited or deleted.

Compressed audio files have no loss of amplitude.

Compressed audio files have a better sound quality.

Compressed audio files takes less time to upload, download, and transfer.

Answers

Answer:

Compressed audio files takes less time to upload, download, and transfer.

Explanation:

the smaller the size, the faster the speed of uploading, downloading, and transferring will be.

Answer:

D.) i think tell me if i am wrong plz and thank you

Explanation

How can using a thesaurus increase the quality of your work?

Answers

Answer:

Using a thesaurus will help you avoid repeating words, avoid beginning sentences with identical words, and add interest or creativity to a document.

Explanation:

Got 100% E2020

Using a thesaurus enhances your work by providing varied vocabulary, avoiding repetition, increasing clarity, encouraging creative expression, and improving overall language proficiency for a polished, professional tone.

Using a thesaurus can significantly enhance the quality of your work by providing a richer vocabulary, which helps to avoid repetition and adds variety to your language. By offering synonyms and related words, a thesaurus allows you to choose more precise and vivid terms that better convey your intended meaning.

This can make your writing more engaging and nuanced, capturing the reader's attention and making your points more compelling.

Additionally, employing a wider range of words can improve the clarity of your writing by reducing ambiguity and making your ideas more distinct. It also encourages more creative and thoughtful expression, as you are prompted to consider different ways to articulate your thoughts.

Furthermore, using a thesaurus can aid in expanding your vocabulary over time, enhancing your overall language proficiency and making you a more versatile writer. By integrating a diverse lexicon, your work can achieve a more polished and professional tone.

What is an identified component of a software program that might allow a hacker or other intruder to gain entry and control of a computing resource?

patch
endpoint
imaging software
vulnerability

Answers

D. Vulnerability

A patch is basically the same thing as a quick bug fix.

An endpoint is basically a way to access a server/resource.

Imaging software is just a type of software.

it’s vulnerability i think

You buy a new workstation that features an embedded RAID controller on the motherboard. You want to setup hardware RAID 10. How many hard drives are required, without multiple partitions per disk, and where would you set this up? (Choose all that apply). Each choice provides half of the answer.

Answers

Answer:

4 hard drives are required for RAID 10 and you would set this up in your operating systems (Windows, Linux, Mac) storage management.

Answer:

4

BIOS

Explanation:

BIOS is short for Basic Input Output System. Its a built-in program a system utilize to power on after it is shut down. It also controls data flow between the operating system and other attached devices such as the hard drive, mouse etc. It is usually found on the motherboard of a system. BIOS manages the hard drives, it acts as an intermediary between the CPU and the I/O (input/output) devices.

Which activity is a case of identity theft?
A. gaining unauthorized access to a computer system
B. sending unsolicited bulk email
C. stealing someone else’s personal data
D. using someone else’s original content without permission

Answers

Answer:

C, stealing someone else's personal data.

The correct answer is C. Stealing someone else’s personal data

Explanation:

Identity theft including the one that occurs through technology is a crime that involves stealing personal data or information, this includes passwords, identification numbers, credit card information, etc. The purpose of this is to obtain advantages, money or products by pretending to be another person. This means the theft steals the identity represented by the name and personal information of the victim. Nowadays, this occurs through technology such as programs to obtain passwords, e-mails that ask users to provide personal information, among others. According to this, the activity that is a case of identity theft is "Stealing someone else’s personal data".

Items that are cut or copied are placed on the Clipboard.


Please select the best answer from the choices provided

T
F

Answers

Anwer is True

please mark me brainliest answer

The answer to this would be true

To insert a column without using commands in any tabs, a user can _____ -click and then click insert column.

There’s no answer choices

Answers

You can RIGHT click and then click insert column. Hope this helped!

Can you help me with this question?

Answers

for var in list:

    print (var)

Explanation:

Other Questions
Which statement about electric and magnetic fields is trueA. electric fields must leave a positive charge and end on a negative chargeB. electric fields and magnetic fields start at a positive and end at a negative.C. Magnetic fields must start at the north pole of a magnet and end at the south pole of a magnet.D. electric fields loop from south to north Jina drove to the mountains last weekend. There was heavy traffic on the way there, and the trip took 6 hours. When Jina drove home, there was no traffic and the trip only took 4 hours. If her average rate was 22 miles per hour faster on the trip home, how far away does Jina live from the mountains?Do not do any rounding. The exponential function, f(x) = 2^x, undergoes two transformations to g(x) = 1/3 x 2^x - 7. how does the graph change? select all that apply. A. It is vertically compressed. B. It is vertically stretched. C. It is shifted right. D. It is shifted down E. It is lipped over the x-axis. which of the following statements about dictionaries is not true !!!!HELP ASAP ITS EASY IM JUST STUPID!!!!What is the area of the following trapezoid?280 mm2420 mm2140 mm2210 mm2 A person has three credit cards with very large outstanding balances and is unable to make payments on any of them. Which action should the person take?A.) Notify a credit reporting agency in order to negotiate a new payment planB.) File for bankruptcy in order to maintain ones current credit scoreC.) Notify the credit card companies in order to negotiate a new payment planD.) Contact the Internal Revenue Service in order to avoid paying income tax this year Where would someone look to find the most reliable information about how tornadoes are measured? *4 pointsA newspaper story about a stormThe personal blog of a storm watcherThe National Weather Service Web siteA Web page that anyone can edit In what ways did he repress civil liberties during the war and otherwise "stretch the limits of presidential authority"?\ According to the lesson, which type of health science career would require the greatest time investment?phlebotomisthealth information managernurse practitionerX-ray technician < Wrong Which concluding sentence would NOT match the tone of the rest of the passage?A)I mean, come on, these parents need to wise up and not be so stupid about the measles!B)The connection between less children being vaccinated and measles being on the rise is hard to dismiss.C)Now parents and scientists are teaming up together to come to terms with the measles vaccination issue.D)The measles vaccination for children is made up of two shots at different times and is 99% effective as a vaccine. What are the name of the 4 moons of Pluto? A person invests 9000 dollars in a bank. The bank pays 6% interest compounded monthly. To the nearest tenth of a year, how long must the person leave the money in the bank until it reaches 14000 dollars? which of the following best describes the cause of the Armenian genocide?-global competition for trade made the Crimean peninsula important-ottoman leaders feared losing parts of the empire to ambitious neighbors-the expansion of islam required the conversion of conquered peoples-the young turks required a unifying mission to elevate them to power I read a book again. I had read it before. It was really interesting.Which sentence combination uses an adjective clause?A. When I read the book again, I found the same book really interesting.B. Although I had read the book, I read it again because it was really interesting.C. I read the same book that I had read, because it was really interesting D. After reading the book, I read it again; it was really interesting. 5x - 2y = 3-5x + 4y = 9 the variable used to show correlation is r, which is also known as the correlation constant?A. TrueB. False Read the passage. From Letter from Birmingham City Jail I must close now. But before closing I am impelled to mention one other point in your statement that troubled me profoundly. You warmly commended the Birmingham police force for keeping order and preventing violence. I dont believe you would have so warmly commended the police force if you had seen its angry violent dogs literally biting six unarmed, nonviolent Negroes. I dont believe you would so quickly commend the policemen if you would observe their ugly and inhuman treatment of Negroes here in the city jail; if you would watch them push and curse old Negro women and young Negro girls; if you would see them slap and kick old Negro men and young Negro boys; if you will observe them, as they did on two occasions, refuse to give us food because we wanted to sing our grace together. Im sorry that I cant join you in your praise for the police department. Dr. King uses the phrase, I dont believe, twice. Which rhetorical device is he using?A. paralellismB. antithesisC. balanceD. emotion Which water-soluble vitamin may build to a toxic level?A. folateB. niacinC. pantothenic acidD. riboflavinE. thiamin Select the three sums equivalent to 13/8. Social realism can be found in _______________. (Choose the best answer) Question 1 options: fairy tales documentaries Action movies Disney cartoons