Why is it difficult to convince top management to commit funds to develop and implement a Strategic Information System

Answers

Answer 1

Answer:

It is difficult to convince top management to commit funds to develop and implement an SIS because it can lead to reengineering, which requires businesses to revamp processes to undergo organizational change to gain an advantage.

Explanation:


Related Questions

Chất xơ có nhiều trong thực phẩm nào?

Answers

Answer:

Quả lê Quả lê là một loại trái cây phổ biến vừa ngon vừa bổ dưỡng. ...

Quả dâu tây. Dâu tây là loại quả cực kỳ ngon. ...

Quả bơ Quả bơ khác hơn so với hầu hết các loại trái cây. ...

Quả táo. ...

Quả mâm xôi. ...

Quả chuối. ...

Cà rốt. ...

Củ cải đường.

what do you do with your points/pts

Answers

Answer: I think nothing

Explanation:

I'm pretty sure they are there so you know how active you are.

do not quote me on that this is just my guess

Is the use of technology to control human behavior a necessary evil or an
unethical breach of privacy and freedom?

Answers

Answer:

The use of technology to control human behavior is a very contentious topic and the answer to this question depends on the individual's opinion and values. Some may argue that technology can be used to limit freedom, however, it can also be used to protect people from harm, such as in the case of automated speed cameras limiting the speed of drivers to prevent accidents. Others may argue that the use of technology to control behavior is an unethical breach of privacy and freedom as it can be used to monitor and restrict people's actions. Ultimately, it is up to the individual to decide whether the use of technology to control human behavior is a necessary evil or an unethical breach of privacy and freedom.

Your cousin gets a weekly allowance, but he always seems to be out of money anytime you buy snacks or go out to watch a movie. You recommend he create a budget, but he says, “No way! That would take so much effort, and I don’t think it’d work anyways! It’s not worth it.” What do you tell him to convince him that a budget could help?

Answers

Answer:

If you want to have more fun with your money, you need a budget. A budget is not a boring thing that tells you what you can't do. It's a smart thing that helps you do what you want to do. Here's how:

- A budget helps you save up for the things you really want, like a trip to Hawaii, a new laptop, or a debt-free life. It also helps you deal with the things you don't want, like a broken car, a hospital bill, or a late fee.

- A budget helps you stop wasting money on the things you don't care about, like snacks you don't eat, movies you don't watch, or subscriptions you don't use. It also helps you find ways to save more money on the things you do care about, like groceries, utilities, or entertainment.

- A budget helps you feel more relaxed and happy about your money. Instead of always stressing about running low on cash or owing money to someone, you can have a clear view of your finances and make smarter choices. You can also enjoy spending money on the things you love without feeling guilty or anxious.

- A budget helps you build good money skills that will last a lifetime. By learning how to budget, you will become more responsible, disciplined, and organized with your money. You will also learn how to prioritize your needs and wants, and how to balance your spending and saving.

So don't think of a budget as something that limits your fun. Think of it as something that enhances your fun. A budget is not a problem. It's a solution.

Hi!
i want to ask how to create this matrix A=[-4 2 1;2 -4 1;1 2 -4] using only eye ones and zeros .Thanks in advance!!

Answers

The matrix A=[-4 2 1;2 -4 1;1 2 -4] can be created by using the following code in Matlab/Octave:

A = -4*eye(3) + 2*(eye(3,3) - eye(3)) + (eye(3,3) - 2*eye(3))

Here, eye(3) creates an identity matrix of size 3x3 with ones on the diagonal and zeros elsewhere.

eye(3,3) - eye(3) creates a matrix of size 3x3 with ones on the off-diagonal and zeros on the diagonal.

eye(3,3) - 2*eye(3) creates a matrix of size 3x3 with -1 on the off-diagonal and zeros on the diagonal.

The code above uses the properties of the identity matrix and the properties of matrix addition and scalar multiplication to create the desired matrix A.

You can also create the matrix A by using following code:

A = [-4 2 1; 2 -4 1; 1 2 -4]

It is not necessary to create the matrix A using only ones and zeroes but this is one of the way to create this matrix.

Who designed the Analytical Engine in the 1830s? Alan Turing Alan Turing Charles Babbage Charles Babbage Bill Gates Bill Gates Steve Wozniak Steve Wozniak

Answers

Charles Babbage Charles Babbage

which of the following is equivalent to (p>=q)?
i) P q iv) !p Where are genius people?:)

Answers

Answer:

Explanation:

This is unsolvable if you have no variable substitutes


p -> q

Took the test !

Create Task for AP computer science principles python

Answers

The AP program offers two computer science courses: AP Computer Science A and AP Computer Science Principles.

Thus, The more comprehensive of the two courses, AP Computer Science Principles teaches students the fundamentals of computer science while emphasizing teamwork.

Although computer science is a useful subject to study, is the exam challenging to pass.

For aspirant AP Computer Science Principles students, it's a good thing that the subject isn't ranked in the top 10 most challenging AP courses. But that doesn't make it any less difficult. Visit our AP Computer Science Principles resource page.

Thus, The AP program offers two computer science courses: AP Computer Science A and AP Computer Science Principles.

Learn more about AP program, refer to the link:

https://brainly.com/question/3121467

#SPJ1

How many passes will it take to find the 20 in this list? (python)

10, 12, 14, 16, 18, 19, 20

3

1

2

4

Answers

Answer:

1

Explanation:

What do you mean by a pass? A pass through each number in the list?

for x in numLst:

    if x == 20:

         return True

This would run through the list once, as you're just checking if each element is 20 in this loop.

Answer:

2

Explanation:

on edge right

Most of the devices on the network are connected to least two other nodes or processing
centers. Which type of network topology is being described?

bus

data

mesh

star

Answers

The network topology “mesh” is being described. In terms of computer science, a kind of topology where devices connect to 2+ nodes is called mesh.

Pet information (derived classes)

The base class Pet has private data members petName, and petAge. The derived class Dog extends the Pet class and includes a private data member for dogBreed. Complete main() to:

create a generic pet and print information using PrintInfo().
create a Dog pet, use PrintInfo() to print information, and add a statement to print the dog's breed using the GetBreed() function.
Ex. If the input is:

Dobby
2
Kreacher
3
German Schnauzer
the output is:

Pet Information:
Name: Dobby
Age: 2
Pet Information:
Name: Kreacher
Age: 3
Breed: German Schnauzer
________________________________________________

the given code:

Main.cpp:

#include
#include
#include "Dog.h"

using namespace std;

int main() {

string petName, dogName, dogBreed;
int petAge, dogAge;

Pet myPet;
Dog myDog;

getline(cin, petName);
cin >> petAge;
cin.ignore();
getline(cin, dogName);
cin >> dogAge;
cin.ignore();
getline(cin, dogBreed);

// TODO: Create generic pet (using petName, petAge) and then call PrintInfo


// TODO: Create dog pet (using dogName, dogAge, dogBreed) and then call PrintInfo


// TODO: Use GetBreed(), to output the breed of the dog


}

___________________________________________________________________________________________

Pet.h

#ifndef PETH
#define PETH

#include
using namespace std;

class Pet {
protected:
string petName;
int petAge;

public:
void SetName(string userName);

string GetName();

void SetAge(int userAge);

int GetAge();

void PrintInfo();
};

#endif
_________________________________________________________________________--

Dog.h

#ifndef DOGH
#define DOGH

#include
#include "Pet.h"

class Dog : public Pet {
private:
string dogBreed;

public:
void SetBreed(string userBreed);

string GetBreed();
};

#endif

____________________________________________________________

Pet.cpp

#include "Pet.h"
#include
#include
using namespace std;

void Pet::SetName(string userName) {
petName = userName;
}

string Pet::GetName() {
return petName;
}

void Pet::SetAge(int userAge) {
petAge = userAge;
}

int Pet::GetAge() {
return petAge;
}

void Pet::PrintInfo() {
cout << "Pet Information: " << endl;
cout << " Name: " << petName << endl;
cout << " Age: " << petAge << endl;
}

__________________________________________________________________

Dog.cpp

#include "Dog.h"
#include
#include
using namespace std;

void Dog::SetBreed(string userBreed) {
dogBreed = userBreed;
}

string Dog::GetBreed() {
return dogBreed;
}

Answers

Answer:

I think the answer is Breed: German Schnauzer don't listen too mee

________________________________________________

the given code:

Main.cpp:

#include

#include

#include "Dog.h"

don't listen

Explanation:

define CPU and its functions​

Answers

Answer:

A central processing unit (CPU), also called a central processor, main processor or just processor, is the electronic circuitry that executes instructions comprising a computer program.

PLEASE HELP IN C++
Integer numElements is read from input. Given the integer vector yearlySalary with the size of numElements, write a for loop to initialize yearlySalary with the remaining integers read from input, in reverse order.

Ex: If the input is

4

102 107 126 138

then the output is:

138 126 107 102

Answers

Code:

numElements = int(input())  # Read the number of elements from input

yearlySalary = []  # Initialize an empty list

# Read the remaining integers from input and append them to yearlySalary in reverse order

for _ in range(numElements):

   yearlySalary.append(int(input()))

# Reverse the list to obtain the desired order

yearlySalary = yearlySalary[::-1]

# Print the elements in yearlySalary

for salary in yearlySalary:

   print(salary, end=' ')







in this solution, we first read the value of numElements from the input. Then, we initialize an empty list yearlySalary. Next, we use a for loop to read the remaining integers from the input and append them to the yearlySalary list. Finally, we reverse the list using slicing (yearlySalary[::-1]) and print the elements in the desired order.

Feel free giving brainliest!

All of the following would be useful information to capture and evaluate as end-of-project lessons learned EXCEPT:



a. Areas for which a different method might yield better results
b. What went well that team members think should be copied and/or adapted for use on future work
c. Information about mistakes and what went wrong
d. Names of team members who made the mistakes and should be blamed

Answers

All of the following would be useful information to capture and evaluate as end-of-project lessons learned EXCEPT: d. Names of team members who made the mistakes and should be blamed

What is the lesson?

When capturing and assessing lessons learned at the conclusion of a venture, it is vital to center on valuable criticism and recognize ranges for advancement instead of doling out fault to particular group individuals.

In all, the center of lessons learned ought to be on recognizing zones for enhancement, capturing effective hones, and advancing a culture of continuous learning and change, instead of accusing people for botches.

Learn more about lessons  from

https://brainly.com/question/25547036

#SPJ1

Compress
00eb:0000:0000:0000:d8c1:0946:0272:879
IPV6 Address

Answers

Answer:

Compress

00eb:0000:0000:0000:d8c1:0946:0272:879

IPV6 Addres

Explanation:

b) Use method from the JOptionPane class to request values from the user to initialize the instance variables of Election objects and assign these objects to the array. The array must be filled.​

b) Use method from the JOptionPane class to request values from the user to initialize the instance variables

Answers

The example of the Java code for the Election class based on the above UML diagram is given in the image attached.

What is the Java code about?

Within the TestElection class, one can instantiate an array of Election objects. The size of the array is determined by the user via JOptionPane. showInputDialog()

Next, one need to or can utilize a loop to repeatedly obtain the candidate name and number of votes from the user using JOptionPane. showInputDialog() For each iteration, one generate a new Election instance and assign it to the array.

Learn more about Java code  from

https://brainly.com/question/18554491

#SPJ1

See text below

Question 2

Below is a Unified Modelling Language (UML) diagram of an election class. Election

-candidate: String

-num Votes: int

<<constructor>>  +  Election ()

<<constructor>> + Election (nm: String, nVotes: int)

+setCandidate( nm : String)

+setNum Votes(): int

+toString(): String

Using your knowledge of classes, arrays, and array list, write the Java code for the UML above in NetBeans.

[7 marks]

Write the Java code for the main method in a class called TestElection to do the following:

a) Declare an array to store objects of the class defined by the UML above. Use a method from the JOptionPane class to request the length of the array from the user.

[3 marks] b) Use a method from the JOptionPane class to request values from the user to initialize the instance variables of Election objects and assign these objects to the array. The array must be filled.

b) Use method from the JOptionPane class to request values from the user to initialize the instance variables
b) Use method from the JOptionPane class to request values from the user to initialize the instance variables

For additional security and to optimize the performance of critical machines on your organization’s network, it is crucial to:___________.

Answers

Answer:

Identify any program or services that you do not need.

Explanation:

As a network administrator, one of the preventive measures that could be adopted to complement your security system or architecture is to identify all the software applications or services that you do not need in an organization. This is because some of these programs might be a spyware, rootkit or compromised software which are used to gain unauthorized access to the network system. Also, you should identify the unused or unwanted programs or services in order to prevent redundancy and to optimize the performance of critical machines or processes in the organization's network.

Hence, for additional security and to optimize the performance of critical machines on your organization’s network, it is crucial to identify any programs or services that you don’t need.

What are software applications?

What are software applications?

Answers

Answer:

the first option is obviously the correct answer

Which of the following would be considered unethical for a programmer to do? (5 points)

Create software used to protect users from identity theft
Ignore errors in programming code that could cause security issues
Protect users from unauthorized access to their personal information
Use someone else's code with the original developer's permission

Answers

One thing that would be onsidered unethical for a programmer to do is B. Ignore errors in programming code that could cause security issues

Why would this be unethical for a programmer ?

Creating software designed to protect users from identity theft stands as a commendable and ethical endeavor, demonstrating the programmer's commitment to safeguarding user information and thwarting identity theft.

Engaging in such behavior would be considered unethical since it undermines the security and integrity of the software, potentially exposing users to vulnerabilities and compromising their sensitive data. Respecting intellectual property rights and obtaining proper authorization reflects adherence to ethical and legal standards.

Find out more on programmers at https://brainly.com/question/13341308

#SPJ1

internet's initial development was supported by a)arpanet b)ibm c) Microsoft d) none of these​

Answers

Answer:

It was supported by arpanet in its initial stage.

hope it helps..

Guys, please help me asap (Photo Attached) !!!!!!! HELP 25pts!!!!

Guys, please help me asap (Photo Attached) !!!!!!! HELP 25pts!!!!

Answers

The answer is the first number line.

30/150 = 1/5 = 20%

Answer:

20%

Convert fraction (ratio) 30 / 150 Answer: 20%

The first one.

Please I need one more braniest for 'expert' may I get it?

Explanation:

Consider a logic function with three inputs A,B, and C, and three outputs D, E, and F. The function is defined as follows:
D is TRUE if at least one input is TRUE, E is TRUE if exactly two inputs are TRUE, and F is TRUE only if all three inputs are TRUE. Design the logic circuit for the function.

Answers

The truth table will contain 2^3 = 8 entries. The image of truth table is attached below. The function will be defined on D is TRUE if at least one input is TRUE, E is TRUE if exactly two inputs are TRUE, and F is TRUE only if all three inputs are TRUE.

What is a Logic Circuit?

Computers frequently chain logic gates together by using the output of one gate as the input to another. That is referred to as a logic circuit.

Circuits allow computers to perform more complex operations than they could with a single gate.

A chain of two logic gates is the smallest circuit.

What is a Logic gate?

Logic gates are the fundamental components of any digital system. It is an electronic circuit with one or more inputs and one output. A logic governs the relationship between the input and the output. Based on this, logic gates are labeled as AND gates, OR gates, NOT gates, and so on.

To learn more about Logic Circuit, visit: https://brainly.com/question/26661878

#SPJ9

Consider a logic function with three inputs A,B, and C, and three outputs D, E, and F. The function is

write a program to check the given number is positive negative or zero​

Answers

Here is a a program to check the given number is positive negative or zero​ with Python code :

# Ask the user to enter a number

num = float(input("Enter a number: "))

# Check if the number is positive, negative, or zero

if num > 0:

   print("The number is positive.")

elif num < 0:

   print("The number is negative.")

else:

   print("The number is zero.")

variables a and b contain the values 0x00 and 0x80, respectively. what will be the content of variable b (in hex notation) and of the z status bit after execution of the following instructions? Write your answers in hex notation. (5 pt.) movf A, W addwf B, W movwfA WREG = [0x00] A = [0x00) B = [0x80] Z-[0x01) C-[0x01]

Answers

The system of variable b (in hex notation) and of the z status bit after execution of the following instructions will be WREG = [0x00] A = [0x00) B = [0x80] Z-[0x01) C-[0x01].

Hexadecimal numbers are occasionally written with a "h" after or "0x" before the number to prevent confusion with the decimal, octal, or other numbering systems. For example, 63h and 0x63 mean 63 hexadecimal. Hexadecimal numbers, such as 7B316, 6F16, and 4B2A16, are an example. Because each digit has a weight of power 16, the hexadecimal number system is also known as a positional number system. Each subsequent digit is 16 times more important than the one before it.

Hexadecimal is used extensively in assembly programming languages and in machine code. When discussing memory addresses, it is frequently used. It can be used to represent numbers recorded in a database and for debugging computer programs.

Know more about database here:

https://brainly.com/question/29412324

#SPJ4

compare and contrast the various write strategy used in cache technologies

Answers

Answer:

The abiotic factors are non-living factors in an ecosystem that affect the organisms and their lifestyle. In this case, low temperature and low humidity lead to the conditions that are unfavorable for birds. So, the birds must adapt to these factors by hiding the food in the caches.

Explanation:

a. Write code to implement the above class structure. Note the following additional information:
Account class: Create a custom constructor which accepts parameters for all attributes. The withdraw method should check the balance and return true if the withdrawal is successful.
SavingsAccount class: Create a custom constructor which accepts parameters for all attributes.
CurrentAccount class: Create a custom constructor which accepts parameters for all attributes. The withdraw method overrides the same method in the super class. It returns true if the withdrawal amount is less than the balance plus the limit.
Customer class: Create a custom constructor which accepts parameters for name, address and id.
b. Driver class:
Write code to create a new Customer object, using any values for name, address and id. Create a new SavingsAccount object, using any values for number, balance and rate. Set the SavingsAccount object as the Customer’s Savings account. Create a new CurrentAccount object, using any values for number, balance and limit. Set the CurrentAccount object as the Customer’s Current account.
Prompt the user to enter an amount to deposit to the Savings account and deposit the amount to the customer’s Savings account.
Prompt the user to enter an amount to withdraw from the Current account and withdraw the amount from the customer’s Current account. If the withdraw method is successful print a success message, otherwise print an error.
Finally print a statement of the customer accounts using methods of the Customer object. Output from the program should be similar to the following:

Enter amount to withdraw from current account:
500
Withdrawal successful
Enter amount to deposit to savings account:
750
Customer name: Ahmed
Current account no.: 2000
Balance: 1000.0
Savings Account no.: 2001
Balance: 1500.0

Answers

According to the question, the code to implement the above class structure is given below:

What is code?

Code is the set of instructions a computer uses to execute a task or perform a function. It is written in a programming language such as Java, C++, HTML, or Python and is composed of lines of text that are written in a specific syntax.

public class Account{

   private int number;

   private double balance;

   //Custom Constructor

   public Account(int number, double balance){

       this.number = number;

       this.balance = balance;

   }

   public int getNumber(){

       return number;

   }

   public double getBalance(){

       return balance;

   }

   public void setBalance(double amount){

       balance = amount;

   }

   public boolean withdraw(double amount){

       if(amount <= balance){

           balance -= amount;

           return true;

       }

       return false;

   }

}

public class SavingsAccount extends Account{

   private double rate;

   //Custom Constructor

   public SavingsAccount(int number, double balance, double rate){

       super(number, balance);

       this.rate = rate;

   }

   public double getRate(){

       return rate;

   }

}

public class CurrentAccount extends Account{

   private double limit;

   //Custom Constructor

   public CurrentAccount(int number, double balance, double limit){

       super(number, balance);

       this.limit = limit;

   }

   public double getLimit(){

       return limit;

   }

   private String name;

   private String address;

   private int id;

   private SavingsAccount savingsAccount;

   private CurrentAccount currentAccount;

   //Custom Constructor

   public Customer(String name, String address, int id){

       this.name = name;

       this.address = address;

       this.id = id;

   }

   public SavingsAccount getSavingsAccount(){

       return savingsAccount;

   }

   public void setSavingsAccount(SavingsAccount savingsAccount){

       this.savingsAccount = savingsAccount;

   }

   public CurrentAccount getCurrentAccount(){

       return currentAccount;

   }

   public void setCurrentAccount(CurrentAccount currentAccount){

       this.currentAccount = currentAccount;

   }

   public String getName(){

       return name;

   }

   public void printStatement(){

       System.out.println("Customer name: " + name);

       System.out.println("Current account no.: " + currentAccount.getNumber());

       System.out.println("Balance: " + currentAccount.getBalance());

       System.out.println("Savings Account no.: " + savingsAccount.getNumber());

       System.out.println("Balance: " + savingsAccount.getBalance());

   }

}

public class Driver{

   public static void main(String[] args){

       Customer customer = new Customer("Ahmed", "123 Main Street", 123);

       SavingsAccount savingsAccount = new SavingsAccount(2001, 1000, 0.1);

       customer.setSavingsAccount(savingsAccount);

       CurrentAccount currentAccount = new CurrentAccount(2000, 1000, 500);

       customer.setCurrentAccount(currentAccount);

       Scanner scanner = new Scanner(System.in);

       System.out.println("Enter amount to withdraw from current account:");

       double amount = scanner.nextDouble();

       if(currentAccount.withdraw(amount)){

           System.out.println("Withdrawal successful");

       }

       else{

           System.out.println("Error");

       }

       System.out.println("Enter amount to deposit to savings account:");

       double amount2 = scanner.nextDouble();

       savingsAccount.setBalance(savingsAccount.getBalance() + amount2);

       customer.printStatement();

   }

}

To learn more about code

https://brainly.com/question/30505954

#SPJ1

If you were to sort the Title field in tblBooks in a Descending order, in ms access which author would be at the top of the list? A. Linda Rode B. Robert Howard C.Isaac Asimov D. Roger D. Abrahams​

Answers

If the Title field in the tblBooks table is sorted in descending order in MS Access, the author at the top of the list would be Linda Rode. So, the correct option is A.

Sorting the Title field in descending order means arranging the titles in reverse alphabetical order.

Out of the given authors, Linda Rode would be at the top of the list because her last name, "Rode," comes first alphabetically when compared to the other authors' last names. The other authors' last names are Howard, Asimov, and Abrahams.When sorting in descending order, the records are listed from Z to A or highest to lowest, depending on the sorting field. In this case, since we are sorting the Title field, which is a text field, the sorting would be in reverse alphabetical order.

Therefore, Linda Rode, with her last name starting with "R," would appear at the top of the list. So, the correct choice is option A.

For more questions on author

https://brainly.com/question/32116759

#SPJ8

The nth Fibonacci number Fn is defined as follows: F0 = 1, F1 = 1 and Fn = Fn−1 + Fn−2 for n > 1.
In other words, each number is the sum of the two previous numbers in the sequence. Thus the first several Fibonacci numbers are 1, 1, 2, 3, 5, and 8. Interestingly, certain population growth rates are characterized by the Fibonacci numbers. If a population has no deaths, then the series gives the size of the poulation after each time period.
Assume that a population of green crud grows at a rate described by the Fibonacci numbers and has a time period of 5 days. Hence, if a green crud population starts out as 10 pounds of crud, then after 5 days, there is still 10 pounds of crud; in 10 days, there is 20 pounds of crud; in 15 days, 30 pounds of crud; in 20 days, 50 pounds of crud, and so on.

Write a program that takes both the initial size of a green crud population (in pounds) and some number of days as input from the keyboard, and computes from that information the size of the population (in pounds) after the specified number of days. Assume that the population size is the same for four days and then increases every fifth day. The program must allow the user to repeat this calculation as long as desired.
Please note that zero is a valid number of days for the crud to grow in which case it would remain at its initial value.
You should make good use of functions to make your code easy to read. Please use at least one user-defined function (besides the clearKeyboardBuffer function) to write your program.

basically I've done all the steps required except the equation in how to get the final population after a certain period of time (days). if someone would help me with this, I'll really appreciate it.

Answers

In Python, it can be expressed as follows. Using the recursive function type, we find the sum of the previous term and the sum of the two previous terms.

Python:

x=int(input("Initial size: "))

y=int(input("Enter days: "))

mod=int(y/5)-1

def calc(n):

   gen_term = [x,2*x]

   for i in range(2, n+1):

       gen_term.append(gen_term[i-1] + gen_term[i-2])

   return gen_term[n]

if(mod==0):

   print("After",y,"days, the population is",x)

else:

   print("After",y,"days, the population is",calc(mod))

The nth Fibonacci number Fn is defined as follows: F0 = 1, F1 = 1 and Fn = Fn1 + Fn2 for n &gt; 1.In

Peter has recently bought a media player and a digital camera. He wants to buy a memory card for these devices. Which memory device should
Peter use in his digital camera and media player?
А.
hard disk
B.
flash memory device
C.
compact disk (CD)
D.
digital video disk (DVD)

Answers

Answer:

B. Flash Memory Device

Explanation:

A hard disk is a device in computers that writes important info to a 2 in diameter disk (don't get confused with Random Access Memory {RAM}).

A CD is a disk that often contains music or a short video clip.

A DVD is a disk that often contains a film

A flash memory device can refer to the following:

SD Card

MicroSD Card

USB - A Flash Drive (Jump Drive, Thumb Drive, etc.)

USB - C Flash Drive

You need to pay an Internet Service Provider (ISP) for services rendered. Which payment technology would you use?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

Secure Sockets Layer (SSL)
B

Payment gateway
C

Transport Layer Security (TLS)
D

Electronic Funds Transfer (EFT)

Answers

Answer:

D. Electronic Funds Transfer (EFT)

Explanation:

e-commerce is a short for electronic commerce and it can be defined as a marketing strategy that deals with meeting the needs of consumers, by selling products or services to the consumers over the internet.

This ultimately implies that, e-commerce is strictly based on the buying and selling of goods or services electronically, over the internet or through a digital platform. Also, the payment for such goods or services are typically done over the internet such as online payment services.

A payment gateway can be defined as a merchant service technology used for the capturing, acceptance and transfer of digital payment from the bank account of a customer (buyer) to the bank account of the merchant (seller). Thus, payment gateway typically involves the use of credit or debit card for the payment of goods purchased or services provided.

In this scenario, you need to pay an Internet Service Provider (ISP) for services rendered. Thus, the payment technology which you would use is Electronic Funds Transfer (EFT).

Other Questions
If a person in your class is not friendly to you and behaves in an aggressive manner, he or she might be: radical apathetic humble hostile The client with cardiac failure is taught to report which symptom to the health care provider or clinic immediately? Plz help fast I will mark brainliest and 15 pointsAfter a period of time, the collagen used to repair the site is converted into specific types of collagen.FalseTrue Given the following data set: 4, 5, 3, 4, 7, 8, 9 (2 points)Calculate the three "measures of variability". You must show all of your work to receive full credit. (copy and paste equations from the correct homework assignment to make this easy). How is an item labeled if it contains 10 grams of fiber?low fiberenrichedfortifiedhigh fiberI need this ASAP please finish the work part for NO.10, I have the answer just need the work part. Please and thank you!! PS. PLEASE SHOW THE WORK ON PAPER! Predict If you sit on a moving bus and toss a coin straight up into the air, where will it land? (1 point) Find the centroid (y) of the region bounded by: y=7x^2, y=0, and x = 4 why might it be irrational for young and healthy people to buy health insurance? b. in what sense do young and healthy people who buy health insurance provide a subsidy to people who are older or who are ill? Although not technically part of microsoft vdi, what could be considered the sixth component of rds? 35. Draw = 3 + 2 + 5. Must Include the Rectangular Prism used to draw 3D vectors. [2 Marks] = Which of the following mRNA codons will bind to the tRNA anticodon 5' GCU 3', considering wobblebase pairing rules. Select one: a. 5' CGA 3' b. 5' AGU 3' and 5' AGC 3' c. 5' AGC 3' d. 5' UGA 3' and 5' CGA 3' which of jesus' miracles affect you or is memorable to you the most? explain why what ratio is greater then 5/8? 12/24 3/4 15/24 4/12 Which of the following is not an undefined term? pointlineray plane 11. In the English legal system, which two of the following are the parties involved ina civil case?A. Prosecution and ClaimantB. Prosecution and AccusedC. Accused and DefendantD. Claimant and Defendant12. Which of the following statements about damages for breach of contract is correct?A. In order to claim damages an innocent party is required to take reasonablesteps to mitigate their lossesB. Damages are not payable in relation to mental distressC. Damages to rectify a defect are still payable even if they are whollydisproportionate to the size of the breachD. Damages in the form of a penalty clause are valid and enforceable13. A director who has not been validly appointed but is held out by the company tobe a director is called:A. De facto directorB. De jure directorC. Alternate directorD. Shadow director14. What is the name given to the person in charge of a voluntary winding-up of acompany?A. AdministratorB. ReceiverC. ChargeeD. Liquidator15. Before it can trade, which of the following criteria must a public company meet?A. Its shares must be listed on a stock exchangeB. It must have appointed an auditorC. It must obtain a trading certificate from the Registrar of CompaniesD. It must have appointed a secretary A lab assistant needs to create a 1000 ML mixture that is 5% hydroelectric acid. The assistant has solutions of 3.5% and 6% in supply at the lab. Using the variables x and y to represent the number of milliliters of the 3.5% solution and the number of milliliters of the 6% solution respectively, determine a system of equation that describes the situation the situation.Enter the equations below separated by a comma How many milliliters of the 3.5% solution should be used?How many milliliters of 6% solution should be used? Dean brings up the ambiguity branch managers at First National Bank face. He believes senior leadership needs to make it clear what managers most importanDean brings up the ambiguity branch managers at First National Bank face. He believes senior leadership needs to make it clear what managers most important priorities are. This thinking most closely resembles which of the following four-frame model principles?. Social architectureb. DEVELOP AGENDA AND POWER BASEc. INSPIRATIONd. ALIGN ORGANIZATIONAL AND HUMAN NEEDSe. TECHNOLOGY Use Descartes' Rule of Signs to determine how many positive and how many negative real zeros the polynomial can have. Then determine the possible total number of real zeros. (Enter your answers as comma-separated lists.)P(x) = x^3 x^2 x 5number of positive zeros possiblenumber of negative zeros possiblenumber of real zeros possible Aproximacin de nmeros radicalesayudaa