A ________ implementation involves considerable modifications to the erp software

Answers

Answer 1

A chocolate implementation involves a good modifications to the ERP software.

What is chocolate implementation?

In the chocolate implementation, the is good system enhancement and it is known too be a  type of implementation that is said to be positive for the users as the package is often customized based on user needs.

Therefore, A chocolate implementation involves a good modifications to the ERP software.

Learn more about chocolate implementation from

https://brainly.com/question/23776149

#SPJ12


Related Questions

after input is finished, another call to read would return which of the following to indicate that the end of the file has been reached?

Answers

After input is finished, another call to read would return an empty string to indicate that the end of the file has been reached.

What is data read from a file?

When data is said to read from a file, it is said to fully or automatically saves itself in a variable. Note that If a file is said to already exists, one can open it.

Note that After input is finished, another call to read would return an empty string to indicate that the end of the file has been reached.

Learn more about input from

https://brainly.com/question/5451281

#SPJ11

how do you determine if a name is a variable holding a value or if it is a function call?

Answers

The way to determine if a name is a variable holding a value or if it is a function call is by:

Instance variables are prefixed with self.

What is this call about?

A function call is known to be a kind of an expression that has the function name which is said to be accompanied by the function call operator, () .

Note that The way to determine if a name is a variable holding a value or if it is a function call is by:

Instance variables are prefixed with self.

See full question below

How do you determine if a variable in a method is an instance variable for the class?

a) Instance variables have leading underscores in their names.

b) Instance variables are prefixed with self..

c) Instance variables start with a capital letter.

d) all of the above

e) none of the above

Learn more about function call from

https://brainly.com/question/15071685

#SPJ11

What is being done to reduce the python population in florida?.

Answers

florida man eats the snake for breakfast

Viruses that load from usb drives left connected to computers when computers are turned on are known as.

Answers

Answer:

Viruses that load from USB drives left connected to computers when computers are turned on are known as boot sector viruses

Explanation:

Software designed to close logical ports in your computer is know as firewall Which is NOT a tool hackers use to gain access to and take control of your computer

What is difference between barcode reader and finger print reader

Answers

Answer:

they are different bc finger printe reader reads when someone one prints it for them

What three application layer protocols are part of the tcp/ip protocol suite?

Answers

The three application layer protocols that are part of the TCP/IP protocol suite are:

DNSDHCPFTP

What is the TCP/IP protocol suite?

The TCP/IP protocol suite is an abbreviation for Transmission Control Protocol and Internet Protocol and it can be defined as a standard framework for the transmission (prepare and forward) of information on digital computers over the Internet.

In the Transmission Control Protocol and Internet Protocol (TCP/IP) model, the three application layer protocols include the following:

DNSDHCPFTP

Read more on TCP here: https://brainly.com/question/17387945

#SPJ12

what type of e-mail typically lures users to sites or asks for sensitive information?

Answers

The  type of e-mail typically lures users to sites or asks for sensitive information is phishing.

What is a phishing email?

Phishing is a type of internet scam where cyber hackers impersonate legitimate organizations via email, text message, advertisement or other means in order to steal sensitive information.

This criminals usually send an email link mimicking the company .

The aim of the email is to get sensitive information in order to access your funds or private information.

learn more on phishing email here: https://brainly.com/question/14954901

#SPJ11

"what types of physical drives does windows disable defragmenting, but provides another method of optimization"

Answers

The drives do windows disable defragmenting, but provide another method of optimization" is solid-state drives.

What is a solid-state drive?

A solid-state drive (SSD) is a new type of computer storage device in comparison to a conventional mechanical hard drive.

SSDs use flash-based memory, which is much faster. One of the best methods to make your computer faster is to switch to an SSD

Therefore, it is more resistant to the use of Solid State Drives to smooth the functioning of computers.

Learn more about SDD, here:

https://brainly.com/question/17285226

#SPJ1

Advancement made
in napier's bones

Answers

Answer:

In 1614, Edinburgh-born Renaissance scholar John Napier invented logarithms. A means of simplifying complex calculations, they remain one of the most important advances in the study and practical application of mathematics.

Explanation:

hope this will help

Which printer management components would you use to view the port a printer uses? (select two. )

Answers

The printer management components one would use to view the port a printer uses are as follows;

Printer propertiesPrinter server properties

What is Printer management components?

The print management component provides a single interface where a user can open the print management utility and view all printers and print servers in the enterprise.

The port of a printer is the connector usually on the computer that allow communication with the printer.

Therefore, the printer management components one would use to view the port a printer uses are as follows;

Printer propertiesPrinter server properties

learn more on printers port here: https://brainly.com/question/17157651

#SPJ12

“ How To “ Speeches and on research findings are two examples of _______ speeches.

Answers

Answer:

Informative

Explanation:

in a spreadsheet, what is text wrapping used for?

Answers

in a spreadsheet, the text wrapping is used for to automatically alter cell height so that it can give room or allow all of the text to fit inside.

What is the feature about?

The Excel wrap text feature is known to be one that can help a person to totally display longer text in a cell even without the cell overflowing or moving to other cells.

Note that, in a spreadsheet, the text wrapping is used for to automatically alter cell height so that it can give room or allow all of the text to fit inside.

Learn more about spreadsheet from

https://brainly.com/question/4965119

#SPJ11

As you are working with a pivot table, you decide to change some of your source data. How will the pivot table recognize the change?.

Answers

You will either click refresh on the analyze ribbon or click Alt+ f5.

An effective tool for calculating, condensing, and analyzing data that enables you to spot comparisons, patterns, and trends in your data is the pivot table.

Manually Update a PivotTable

Make a change to the PivotTable's source data.Navigate to the PivotTable.Click any cell inside the PivotTable. The PivotTable Tools are displayed on the ribbon.Click the Analyze tab on the ribbon.Click the Refresh button. Alt + F5 also refreshes the PivotTable.

Tip: To update all PivotTables in your workbook at once, click Analyze > Refresh All.

learn more about PivotTable here: https://brainly.com/question/27813971

#SPJ10

write the icon of full justification​

Answers

Answer:

In the paragraph group, click the Dialog box Launcher. ,and select the Alignment drop - down menu to set your justified text. You can also use the keyboard shortcut , Ctrl + J to justify your text

College is considered _____ education. Please type the correct answer in the following input field, and then select the submit answer button or press the enter key when finished.

Answers

Answer:

Postsecondary education 

Explanation:

What is the most common way to obtain new software?.

Answers

Today, the most common way to get new software is to download it from the Internet. Applications like Microsoft Office and Adobe Photoshop can now be purchased and downloaded right to your computer. You can also install free software this way.

what type of storage drive contains multiple spinning platters?

Answers

The type of storage drive that contains multiple spinning platters is called; Hard disk drives

What is the hard disk drive?

A computer hard disk drive (HDD) is a non-volatile data storage device. Non-volatile refers to storage devices that maintain stored data when turned off.

Now, the correct answer to the question is hard disk drives. This is because a hard disk drive is comprised of a stack of spinning metal disks known as platters. Each spinning disk has trillions of tiny fragments that could possibly be magnetized in order to represent bits (1s and 0s in binary code).

Read more about Hard disk drives at; https://brainly.com/question/24498473

#SPJ12

What is boot sector virus​

Answers

Answer:

Boot Sector virus is when a virus infects the Boot Sector of a hard disk. A Boot Sector is the initial files necessary to start an OS and other bootable programs. It is typically infected by these viruses when started with infected floppy disks, however the boot virus does not have to be successful to infect your computer. Once infected, the virus tries to infect every other disk.

Hope this helps!

Mr. Gomez notes that a Private Fee-for-Service (PFFS) plan available in his area has an attractive premium. He wants to know if he must use doctors in a network as his current HMO plan requires him to do. What should you tell him

Answers

The thing that he will be told is that he may receive healthcare services from any doctor allowed to bill Medicare.

What is Medicare?

Medicare simply means a government national health insurance program in the United States.

In this case, the thing that he will be told is that he may receive healthcare services from any doctor allowed to bill Medicare.

Learn more about Medicare on:

brainly.com/question/15074045

#SPJ12

What term is used to describe selecting and viewing information in a database?

Answers

Answer:

Query

Explanation:

A query is a request for information that causes a database to be searched for the requested information. A set of pre-defined codes must be used when writing a query so that the database can interpret the request. A database requests information from another database. The query should be made in a database table or group of tables using the query language, a type of programming language. In this manner, the system is able to comprehend and handle the query appropriately.

A terminology which is used to describe selecting and viewing information stored in a database is known as query.

What is query?

A query can be defined as a computational request, selection and view of the data that are stored in a database table, from existing queries, or even from a combination of both a database table and existing queries.

In this scenario, we can infer and logically conclude that query is a terminology that is typically used to describe selecting and viewing of information that are stored in a database.

Read more on query here: https://brainly.com/question/25266787

#SPJ12

Bios or uefi allow you to configure, enable, and disable the _____ that are bound to the motherboard

Answers

Answer:

devices

Explanation:

BIOS and UEFI are two computer firmware protocols that act as an interpreter between the operating system and the computer firmware. Both of these interfaces are used at computer launch to setup hardware components and launch the operating system stored on the hard drive.

BIOS or uefi allow you to configure, enable, and disable the devices that are bound to the motherboard.

What is BIOS in motherboard?

BIOS is known to be the (basic input/output system)  and it is a program of the computer's microprocessor that often helps to start the computer system after it is said to be powered on.

Note also that BIOS or uefi allow you to configure, enable, and disable the devices that are bound to the motherboard.

Learn more about BIOS from

https://brainly.com/question/13103092

#SPJ12

In any collaboration, data ownership is typically determined by:

Answers

In all collaboration, data ownership is typically determined by the type and source of funds that are used to support a project.

What is data ownership?

Data ownership can be defined as a terminology which connotes the legal and formal ownership of a particular project or software program.

In all collaboration between investors, project manager and clients, data ownership is typically determined by the type and source of funds that are used to support a project.

Read more on data ownership here: https://brainly.com/question/5346702

#SPJ12

WAP to input the rating of a movie, and print as per the given criteria:
Rating Category
8.0-10 Blockbuster
6.0-7.9 Super Hit
4.0-5.9 Hit
2.0-3.9 Average
<2.0 Flop​
please answer fast

Answers

Answer:

What is the question?

Explanation:

explain stress management give a suitable example to explain how it is important.

Answers

Answer:

Hopefully This Will Help :)

Explanation:

Put simply, stress management is: “set of techniques and programs intended to help people deal more effectively with stress in their lives by analyzing the specific stressors and taking positive actions to minimize their effects”. Popular examples of stress management include meditation, yoga, and exercise.

When there is a missing DLL file, _______.
A. Hard drive needs to be scanned
B. the computer will display error messages
C. Applications might run slowly

Answers

Answer:

B. the computer will display error messages

When there is a missing DLL file, the computer will display error messages. The correct option is B.

What is a DLL file?

DLL is dynamic link library is a concept of Microsoft implementation of the shared library concept of Microsoft Windows. This library contains codes and data that can be use in making a program.

Thus, the correct option is B. the computer will display error messages.

Learn more about a DLL file

https://brainly.com/question/23551323

#SPJ1

Which set of cisco ios commands instructs the ips to compile a signature category named ios_ips into memory and use it to scan traffic?

Answers

A set of Cisco IOS commands that instructs the IPS to compile a signature category with the name IOS_IPS into memory are listed below.

What is a command?

A command can be defined as the set of instructions that is used to configure a network device such as a router, so as to make it active on a computer network and enable it perform certain tasks automatically during network communication.

In this scenario, a set of Cisco IOS commands that can be used to instruct the IPS in compiling a signature category with the name IOS_IPS into memory and use it to scan network traffic include the following:

R1(config)# IP IPS signature-category.R1(config-ips-category)# category IOS_IPS basic.R1(config-ips-category-action)# retired false.

Read more on commands here: brainly.com/question/17147683

#SPJ12

The it components of an erp system architecture include the hardware, software and the ________

Answers

The components of an ERP system architecture is made up of the hardware, software and the Data.

What is an ERP system?

Enterprise resource planning (ERP) is known to be a kind of  software that firms often use to handle or manage day-to-day business works such as accounting and others.

Note that The components of an ERP system architecture is made up of the hardware, software and the Data.

Learn more about  ERP system from

https://brainly.com/question/14635097

#SPJ12

whts the mistake in this
pls do help me out

Answers

Explanation:

i don't even know it's uclear what the mistake is

the scope of a temporary table is limited to what?

Answers

The scope of a temporary table is limited to the database session in which it's defined.

What is a database?

A database can be defined as an organized and structured collection of data that are stored on a computer system as a backup and are usually accessed electronically.

In database management system (DBMS), the scope of a temporary table is generally limited to the database session in which it's defined by a software developer or programmer.

Read more on database here: brainly.com/question/13179611

#SPJ12

Starting in 2024 under a new law, all new smartphones sold in the eu must have….

Answers

Answer:

USB type C cables.

Explanation:

Other Questions
what should you consider when choosing a type of activity How does an improvement in productivity affect a business's profit margin?A. It increases the profit margin by lowering costs.B. It decreases the profit margin by lowering costs.C. It decreases the profit margin by raising costs.D. It increases the profit margin by raising costs. Which word best replace eliminating strategies to encounter the challenges faced while implementing a ncds free community In the meanwhile the little child at Troezen on the other side of the sea had grown to be a man. His name, Theseus, was in everybody's mouth, for he had done great deeds of daring; and at last he had come to Athens to find his father, King Aegeus, who had never heard whether he was alive or dead; and when the youth had made himself known, the king had welcomed him to his home and all the people were glad because so noble a prince had come to dwell among them and, in time, to rule over their city.The springtime came again. The black-sailed ship was rigged for another voyage. The rude Cretan soldiers paraded the streets; and the herald of King Minos stood at the gates and shouted:"Yet three days, O Athenians, and your tribute will be due and must be paid!"Then in every street the doors of the houses were shut and no man went in or out, but every one sat silent with pale cheeks, and wondered whose lot it would be to be chosen this year.The Cruel Tribute,James BaldwinWhat directly causes the Athenians to hide in their homes?the return of springthe arrival of the Cretan soldiersthe arrival of Theseuthe oppressive rule of King Aegeus If f(n)= n-n, then f(-4) isO-2012-1220 In the nebular hypothesis, why did the nebula start to collapse? 2 Simplify.ae72+16250-8228+28 During world war i, the united states government primarily financed the war through. RewardStyle helps brands and lifestyle influencers engage successfully in e-commerce. RewardStyle is a global community of more than 60,000 influencers who connect consumers with one million brand partners. RewardStyle relies on user-generated content on a website to assist consumers with purchases and builds strong relationships between influencers and brands. This is an example of _______. a. integrated marketing b. sales promotion c. crowdsourcing d. social commerce What does it mean if an investment has little liquidity? Capitalism has both improved the overall prosperity of humanity and amplified relative inequality over the last 300 years. On a global basis, which one of the following sets of statements is most accurate?Group of answer choicescapitalism is neither positive and nor negativecapitalism is equally positive and negativecapitalism is primarily negative, but with some important positive effectscapitalism is primarily positive, but with some important negative effects information may be cui in accordance with: Mr. Keating in the "The Dead Poet Society" movie tells his students that his goal for them is not to become artists but free-thinkers. Answer the following questions completely. Do you think its important to be a free-thinker? Why or why not? What kinds of skills and characteristics make someone a free-thinker? Performing 4 weeks of stabilization training before moving on to strength endurance training for another 4 weeks would be an example of what kind of periodization How are microtubules built and destroyed? Carl is making a garden that is twice as long as it is wide. he wants to cover 271 square feet with the garden. which equation best represents the situation if x represents the length of the garden? The figure below shows a large rectangle with a small rectangle cut out of it.What is the area? A group of mothers and their babies were having a playdate at the park when a baby stopped breathing. One of the mothers performed CPR on the baby. Which action did the mother perform on the baby You market many different types of insurance and ordinarily you spend time each evening calling potential clients. To comply with requirements for marketing medicare advantage and part d plans, what must you do about contacting potential clients to market those plans?.