answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semenov [28]
2 years ago
13

Isabella's manager has asked her to write up a _____ that describes their company's interest in developing a custom software sol

ution for processing orders and asks vendors to estimate the cost and time needed to create the software.
Computers and Technology
1 answer:
kakasveta [241]2 years ago
6 0

Answer:

Request for information (RFI)

Explanation:

Request for Information is a business process document that contains information about an organization's capability to deliver solutions to a potential client. The RFI document will contain information that will help for decision making by clients. Other similar business documents in this line are Request for tender (RFT), request for quotation (RFQ).

You might be interested in
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
2 years ago
"use the ______ element to create logical areas on a web page that are embedded within paragraphs or other block formatting elem
8090 [49]

Answer:

"use the span element to create logical areas on a web page that are embedded within paragraphs or other block formatting elements."

Explanation:

  • The question is associated with HTML and web pages. As span is a type of function in HTML.
  • <span> element is actually a generic in-line tool/container which is used for content phrasing. Its functionality is much like a <div> element but <div> is a block-level element and on the other hand <span> element is in-line element.

  • <span> element groups elements for styling purposes, but it does not represents anything inherently.

5 0
2 years ago
All of the following are specific security challenges that threaten corporate systems in a client/server environment except:
Fudgin [204]

Answer:

Option D i.e., radiation is the correct answer.

Explanation:

When any person challenges the specific security system for the purpose of stealing the resources from the corporate security system then they unable to threaten the radiation because it is the electromagnetic waves that affect the body or skin of any human being and it can be generated by those devices that have high-voltage.

8 0
2 years ago
Explain in two or three sentences why health science careers are among the fastest growing careers in
il63 [147K]

Answer:

The growing concern of health science professionals and their limited number has caused students to opt for the courses in the U.S.

Explanation:

Health science professions account for more than half of the top twenty major growing occupations worldwide. According to the survey in 2018, it was estimated that by 2020 the United States would need around six million additional healthcare employees. And in the present scenario of the Coronavirus pandemic, it has been increased incredibly.  And therefore more educational institutes are providing programs to assist students to prepare for health science careers.

3 0
2 years ago
A search box does all of the following EXCEPT ________.
Rudik [331]
The answer is the first one
6 0
2 years ago
Read 2 more answers
Other questions:
  • The elements in a string type array will be initialized to ____.?
    10·1 answer
  • To read encrypted data, the recipient must decipher it into a readable form. what is the term for this process? re-securing decr
    5·1 answer
  • Claire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of
    11·1 answer
  • Use the following data definitions data myBytes BYTE 10h,20h,30h,40h myWords WORD 3 DUP(?),2000h myString BYTE "ABCDE" What will
    9·1 answer
  • Write a function called st_dev. St_dev should have one #parameter, a filename. The file will contain one integer on #each line.
    7·1 answer
  • In this exercise we look at memory locality properties of matrix computation. Th e following code is written in C, where element
    9·1 answer
  • You discover many errors in a database table. What has been lost?
    15·2 answers
  • The signature area in a cover letter includes the sender's first and last name, followed by his/her job title (if applicable). *
    13·1 answer
  • 1. (1 point) Which flag is set when the result of an unsigned arithmetic operation is too large to fit into the destination? 2.
    13·1 answer
  • Write an application that accepts up to 20 Strings, or fewer if the user enters the terminating value ZZZ. Store each String in
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!