An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture, curate, and consume customer information to improve their services?

Answers

Answer 1

Answer: Data and Insights

Explanation:

Data and Insights in an enterprise platform is very important as it helps users better understand their customers so that they may be able to offer them the best services.

Data allows the platform to capture the data of the customer and insights then curates and consumes the data for analysis. The result of this analysis will enable the company to better understand the customer so that they might be able to offer preferable products.


Related Questions

You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside.Which method of NAT translation should you implement for these servers?

Answers

Answer: Static

Explanation:

Network Address Translation is simply designed for the conservation of IP address. It allows private IP networks which makes use of unregistered IP addresses to be able to connect to the Internet.

Static Network Address Translation enables port number translatation and IP addresses from inside to the outside traffic likewise from the outside to the inside traffic.

A two-dimensional array of ints, has been created and assigned to a2d. Write an expression whose value is the number of rows in this array.

Answers

Explanation:

oi.........................

Which access control type would you use to grant permissions based on the sensitivity of the information contained in the objects

Answers

Answer:

Mandatory Access Control (MAC) is a means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (i.e., clearance) of users to access information of such sensitivity.

What CSS property do you use to determine whether flex items are displayed horizontally or vertically

Answers

Answer:

Flex direction

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head.

The head (header) contains information such as version of HTML, title of a page, metadata, link to custom favicons and cascaded style sheet (CSS) etc.

On the other hand, the body of a HTML document contains the contents or informations that a web page displays.

Generally, the part of a HTML document where the cascaded style sheet (CSS) file is linked is the header.

A style sheet can be linked to an HTML document by three (3) main methods and these are;

I. External style.

II. Inline style.

III. Embedded (internal) style.

Flex direction is a CSS property that's used to determine whether flex items are displayed horizontally or vertically.

7. The message on a diamond-shaped sign might be
a. Pass With Care, Trucks Use Right Lane, or
Do Not Pass.
b. Curve, Hill, or Winding Road.
One Way, Wrong Way, or No Trucks.
d. No Turn, Speed Zone Ahead, or Left Lane
Must Turn Left.

Answers

Answer:

a. pass with care, trucks use right lane, or do not pass

you press the F9 key to convert an object to a symbol true or false​

Answers

Answer:

False,

Reason

F8 key is used for the coversion of object to symbol

When the ping command is used, output is similar across operating systems. Which two values are displayed as part of the output

Answers

Answer: round-trip time

message byte size.

Explanation:

Ping refers to the primary IP command that is used in the troubleshooting of connectivity, and reachability. The ping command is also used in testing the computer's IP address.

When the ping command is used, output is similar across operating systems and the two values that are displayed as part of the output include the round-trip time and the message byte size.

fill in the blank figuring out what type of garden you want to grow is the ____step according to the instructions in how to grow a school garden

Answers

Answer:

First.

Explanation:

How to grow a school garden is an illustrative guide that explains to students the step by step process for growing a school garden.

According to the instructions in how to grow a school garden, the first and most important step is figuring out what type of garden you want to grow. At this step, a student should have a good understanding of the type of garden he or she wants to grow.

Thus, this step answers the question of "what am I growing in the garden?"

18. Which of the following provides the SLOWEST Internet access?
O Ti line
Network
Digital Subscriber line (DSL)
Dial-up

Answers

Answer:

Dial up

Explanation:

Dial-up is by far the slowest of all Internet connections available. Use of dial-up requires a separate phone line, since users must connect via the telephone to their Internet service provider.

To increase security on your company's internal network, the administrator has disabled as many ports as possible. However, now you can browse the internet, but you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?

Answers

Answer:

443

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In order to be able to perform secure credit card transactions on your system, you should enable HTTPS operating on port 443.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL). It is a standard protocol designed to enable users securely transport web pages over a transmission control protocol and internet protocol (TCP/IP) network.

Hence, the port that needs to be enabled to allow secure transactions is port 443.

In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.

Answers

Answer:

case-based.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

A case-based reasoning application refers to a knowledge-based system that is designed and developed to use previous case scenarios (similar past problems) to interprete or proffer a solution to a problem.

In design and implementation of any case-based reasoning application, there are four (4) Rs involved: retrieve, reuse, revise, and retain.

What best Describes algorithm bias

Answers

Answer:

E

Explanation:

cause e

We made a distinction between the forwarding function and the routing function performed in the network layer. What are the key differences between routing and forwarding

Answers

Answer: forwarding: move packets from router's input to appropriate router output

routing: determine route taken by packets from source to destination

Explanation:

The network layer refers to where connections take place in the internet communication process by sending packets of data between different networks.

The distinction between the forwarding function and the routing function performed in the network layer is that the forwarding function move packets from the input of the router to the appropriate router output while the routing function:m helps in knowing the routee taken by packets from the source to destination.

Change the case of letter by​

Answers

Answer:

writing it as a capital or lower case.

Explanation:

T - upper case

t - lower case

not sure if that is what you meant or not

Answer:

Find the "Bloq Mayus" key at the left side of your keyboard and then type

Explanation:

Thats the only purpose of that key

You connect your computer to a wireless network available at the local library. You find that you can access all of the websites you want on the internet except for two. What might be causing the problem?

Answers

Answer:

There must be a  proxy server that is not allowing access to websites

Explanation:

A wireless network facility provided in colleges, institutions, or libraries is secured with a proxy server to filter websites so that users can use the network facility for a definite purpose. Thus, that proxy server is not allowing access to all of the websites to the user on the internet except for two.

explain the following terms

copyleft:

creative Commons:

GNU/GPL:​

Answers

Answer:

Explanation:

copyleft:

Copyleft is the practice of granting the right to freely distribute and modify intellectual property with the requirement that the same rights be preserved in derivative works created from that property.

creative Commons:Creative Commons (CC) is an internationally active non-profit organisation that provides free licences for creators to use when making their work available to the public. These licences help the creator to give permission for others to use the work in advance under certain conditions. Every time a work is created, such as when a journal article is written or a photograph taken, that work is automatically protected by copyright. Copyright protection prevents others from using the work in certain ways, such as copying the work or putting the work online. CC licences allow the creator of the work to select how they want others to use the work. When a creator releases their work under a CC licence, members of the public know what they can and can’t do with the work. This means that they only need to seek the creator’s permission when they want to use the work in a way not permitted by the licence. The great thing is that all CC licences allow works to be used for educational purposes. As a result, teachers and students can freely copy, share and sometimes modify and remix a CC work without having to seek the permission of the creator3. GNU/GPL:​

GPL is the acronym for GNU's General Public License, and it's one of the most popular open source licenses. Richard Stallman created the GPL to protect the GNU software from being made proprietary. It is a specific implementation of his “copyleft” concept.

Software under the GPL may be run for all purposes, including commercial purposes and even as a tool for creating proprietary software, such as when using GPL-licensed compilers. Users or companies who distribute GPL-licensed works (e.g. software), may charge a fee for copies or give them free of charge.

explain the importance of using onedrive in windows 10, and how knowledge of it will have an impact on today's workplace

Answers

Answer:

The importance of using Onedrive it helps save stuff if you have no more room on your computer it helps with schooling and works for jobs you have Microsoft Teams, Onedrive, Outlook, Office 365. It gives all sorts of things that you can use for anything contacts on Outlook and Teams.

You should avoid having other people in portraits with children. True False

Answers

Answer:

You should avoid having other people in portraits with children.

✓ False

Explanation:

You want to use your Windows workstation to browse the websites on the internet. You use a broadband DSL connection to access the internet. Which network protocol must be installed on your workstation to do this

Answers

Answer:

IP

Explanation:

Convert to different number system as mentioned.(17)10=(?)2​

Answers

“convert to a different number system as mentioned” there was no number system mentioned, but if you are just trying to find 17 * 10 = x * 2

all you need to do is find that 17 * 10 = 170 and 170/2 is 85 so

17 * 10 = 85 * 2

Write a program, which will take 20, inputs from the user and find how many
odd and even numbers are there.

Pseudocode & Python

Answers

Answer:

user_input = [int(input()) for i in range(20)]

even = []

odd = []

for i in user_input:

if i%2:

even.append(i)

else:

odd.append(i)

print("odd : ", len(odd), "even : ", len(even))

Explanation:

The above code is written in python :

Using a list comprehension we obtain a list of 20 values from the user and store in the variable user_input.

Two empty list are defined, even and odd which is created to store even and odd values.

A for loop is used to evaluate through the numbers in user_input. Even values leave no remainder when Divided by 2 and are appended to the even list while those those leave a raunder are automatically odd values. The elements each list are counted using the len function and are displayed using the print statement.

#include

int main()
{
char ch;
printf("Enter any letter");
ch=getch
();
printf("\nYou Pressed %c",ch);

return 0;
}
whats the error not giving the correct output

Answers

Answer:

#include<studio.h>

#include<conio.h>

void main()

{

char ch;

printf("Enter any letter");

scanf("%c",&ch);

When you purchase a device, system software is already loaded on it. Which of the following system software settings can you customize?

Answers

Answer:

Screen resolution

Explanation:

The brightness of the words and pictures displayed on computer screen is referred to as screen resolution. Items seem crisper at larger resolutions, such as 1600 x 1200 pixels. They also seem smaller, allowing for more objects to be displayed on the screen. The greater the resolution supported by a display, the larger it is.

You have a Windows 2016 Server with DFS. During normal operation, you recently experience an Event 4208. What should you do first to address this issue

Answers

Answer: Increase your staging folder quota by 20%

Explanation:

The Distributed File System (DFS) allows the grouping of shares on multiple servers. Also, it allows the linking of shares into a single hierarchical namespace.

Since there's a Windows 2016 Server with DFS and during normal operation, an Event 4208 was experienced, the best thing to do in order to address the issue is to increase the staging folder quota by 20%.

La historia de los productos tecnologicos
porfa

Answers

Answer:

La tecnología es el conocimiento y el uso de herramientas, oficios, sistemas o métodos organizativos. La palabra tecnología también se usa como un término para el conocimiento técnico que existe en una sociedad.

La demarcación entre tecnología y ciencia no es del todo fácil de hacer. Muchos programas de ingeniería tienen un gran elemento de ciencias y matemáticas, y muchas universidades técnicas realizan investigaciones exhaustivas en materias puramente científicas. La mayor parte de la ciencia aplicada generalmente se puede incluir en la tecnología. Sin embargo, una diferencia fundamental importante es que la tecnología tiene como objetivo "ser útil" en lugar de, como la ciencia en su forma ideal, comprender el mundo que nos rodea por sí mismo. El hecho de que comprender la realidad que nos rodea (sobre todo en forma de leyes y principios universales) sea muy útil para fines técnicos, explica por qué la ciencia y la tecnología tienen grandes similitudes. Al mismo tiempo, existen áreas de conocimiento e investigación en tecnología e ingeniería donde las propias ciencias naturales puras han hecho contribuciones muy limitadas, como la tecnología de producción, la tecnología de la construcción, la ingeniería de sistemas y la informática. En estas y otras áreas de la tecnología, por otro lado, puede haber depósitos de matemáticas, economía, organización y diseño.

A__________is a system that incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries.

Answers

Answer:

global information system (GIS)

Explanation:

A global information system (GIS) is an information system that works across national borders, facilitates communication between headquarters and subsidiaries in other countries, and incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data ...

The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________.

Answers

Answer:

Compactness

Explanation:

Have a nice day!

what is the use of a piano​

Answers

To produce music using the keys provided with the instrument?
It sharpens fine motor skills, improves dexterity and hand-eye coordination. Music has also been shown to reduce heart and respiratory rates, cardiac complications, and to lower blood pressure and increase immune response. Playing the piano also makes your hands and arm muscles much stronger than the average person.

What term refers to a person using a computer to perform routine tasks other than systems administration

Answers

Answer:

end user

Explanation:

An end user refers to a person using a computer system to perform routine tasks such as listening to music, formatting a document, creating graphic designs, surfing the web, etc., rather than perform systems administration. Thus, an end user is the individual for whom a software application or computer system is created for, especially to perform basic or routine tasks.

For example, a network or system administrator is saddled with the responsibility of implementing changes on an end user's network and network devices in order to get an optimum level of performance.

The logical structure in which one instruction occurs after another with no branching is a ____________.

Answers

Answer:

sequence

Explanation:

The logical structure in which one instruction occurs after another with no branching is a sequence.

Other Questions
What do You need to know ? What is the default return type of a method in Java language?A.VoidB.IntC.NoneD.Short Write an argumentative essay for or against setting long term goals to land a dream job Difference between Health, population and Environment Eduaction. it is estimated that 50% of emails are spam emails. Some software has been applied to filter these spam emails before they reach your inbox. A certain brand of software claims that it can detect 99% of spam emails and the probability for a flase positive is 5%. What is the probability that an email is detected as spam As you move farther away from a source emitting a pure tone, the ___________ of the sound you hear decreases. Deon bought a desk on sale for $105.60. This price is 67% less than the original price. What was the original price? Would you rather?buy 2 lollypops for $2buy 30 lollypops for $40 Using the table below, what is the rate of change? Don't forget to include your units.Number of sodas 24283236Total Cost ($)18212427 complete the sentences with the correct form of these words.[ be in the public eye] [be on the big screen] [go viral] [have a lot of hits] [make a name for yourself] [make the headlines]1. many stars don't like being watched all the time. They aren't kee on ___ every minute of the day2. the story about the singer's car crash ___ yesterday. it's on the front page of every newspaper in britian3. ken liked being a TV actor, but since he appeared in his first time he loves ___ even more4. how many people have to like an online video before it ___?5. a person should go to Hollywood if they really want to ___ in the acting business.6. wow! our video ___, yesterday it had a thousand and today it has twice as many! Let us go, through certain half-deserted streets, The muttering retreats Of restless nights in one-night cheap hotels And sawdust restaurants with oyster-shells: How is this excerpt an example of dramatic monologue A new car manufacturer advertises that their car can go from zero to sixty mph in 8 [s]. This is a description of Answer the following questions in your own words on how you understand the lesson.differentiate the following pairs of terms.1.Save and Save As2.Blank Document and Template3. Existing File and Recently Open File Explain the following terms.a) Explain Final keyword with example. b) Define Static and Instance variables PLISSSSSS HELPPPPPP!!!!!!!!!!!!!!!!!!!!!!!! What number line model represents the expression 5 1/2 + (-3) How can researchers best overcome the language barrier issues that arise when they administer questionnaires to people in foreign countries? The top and bottom ends of a windshield wiper blade are R = 24 in. and r = 14 in., respectively, from the pivot point. While in operation, the wiper sweeps through 135. Find the area swept by the blade. (Round your answer to the nearest whole number.) write an algorithm for finding the perimeter of a rectangle On a coordinate plane, a line goes through points (negative 1, 0), (0, 1), and (1, 2). Which table goes with the graph?