Microsoft has improved the ________ part of its value chain by providing formal reviews of its suppliers, which has helped to clarify expectations for them.

Answers

Answer 1

Microsoft has improved the  procurement part of its value chain by providing formal reviews of its suppliers, which has helped to clarify expectations for them.

What is the procurement process?

Procurement is known to be a term that connote all kinds of activities involved the act of getting the goods and services a firm do needs to aid its day to day operations.

It is one that is made up of sourcing, negotiating agreements, buying items, getting and inspecting goods and others.

Therefore, Microsoft has improved the  procurement part of its value chain by providing formal reviews of its suppliers, which has helped to clarify expectations for them.

Learn more about procurement process   from

https://brainly.com/question/1489991

#SPJ1


Related Questions

Spoofing is the forging of the __________ address on an email so that the email message appears to come from someone other than the actual sender.

Answers

Answer: Return

Explanation:

Utilities are specialized programs that help the operating system function more efficiently. they are essential for computer maintenance and some come built-in to the operating system. True or false

Answers

Utilities are specialized programs that are often built-in in computers to provide support to the operating system to function more efficiently and are crucial for computer maintenance. Thus, the given statement is true.

Utility programs are system software that perform specific functions to maintain proper working of computers in an efficient way. Utility programs optimize computers performance by analyzing and managing tasks and resources of operating systems to handle different situations.

Utility programs are often pre-installed with operating systems as well as a large variety of utility programs are available on the internet for downloading or purchasing that facilitate operating systems in multiple ways.

Certain common tasks of utility programs include installation and uninstallation, virus detection, data backup and restore, deletion of unwanted files, task scheduling, and disk fragmentation.

Some examples of utility programs are disk management tools, backup software, file management tools, compression tools, and antivirus software.

You can learn more about utility programs at

https://brainly.com/question/22247778

#SPJ4

What are the major activates of operating systems with regard to file management?

Answers

Creating, deleting, manipluation, backing up file and mapping to permanent storage are the major activities of operating systems with regard to file management.

File basically refers to collection of specific information stored in the memory of computers and file management refers to the process of manipulating these files, such as  creating, modifying and deleting files.

Following are the five major activities of all operating systems in regard to file management :

Creating and deleting files:  This service creates new files and places them at the particular locations. Also it deletes unnecessary files.Creating and deleting directories: This function helps to store the files in separate folders known as directories that support users to search files quickly. Also deleting files from directories is performed by this activate.File manipulation instructions: It provides functionality to manipulate files and directories, such as modifying the data on files and changing  file names in the directories.Mapping to permanent storage: It helps in mapping files onto secondary storage so that the files can be located easily and quickly.Backing up files: This service prevents data loss by providing a backup facility of data on stable and secure storage devices.

File management is one of the basic and important functions that all operating systems perform. Therefore, creating, deleting, backing up and manipulation are the major activities of operating system regarding files management.

You can learn more about file management at

https://brainly.com/question/12736385

#SPJ4

The primary function of ____ layer protocols is to move datagrams through an internetwork connected by routers.

Answers

The primary function of network layer protocols is to move datagrams through an internetwork connected by routers.

An separate, self-contained message known as a datagram is sent through the network, and its arrival, arrival time, and content are all unreliable.

A "datagram" is a chunk of data transferred through a network that uses packet switching. An information-rich datagram can be routed from its source to its destination. An IP packet is an example of a datagram using this definition. Datagram is essentially another word for "packet."

a service mode where a packet-switched network routes each datagram independently of any others that may have come before or after it. There is no need to set up a planned path for the packets to transit via the network because datagram service is connectionless.

Learn more about datagram:

https://brainly.com/question/28389702

#SPJ4

Jonathan spends his free time writing and testing code. what type of software does he work with?

Answers

Since Jonathan spends his free time writing and testing code, the type of software that he work with is Open source software.

What is open source software?

Open source software is known to be some line of code that is said to be set up so as to be publicly available to everyone to see, change, and distribute the code as they want to.

Note that  Open source software is made  in a decentralized as well as collaborative way and as such, Since Jonathan spends his free time writing and testing code, the type of software that he work with is Open source software.

Learn more about Open source software from

https://brainly.com/question/4593389

#SPJ1

what does an operating system do

Answers

Answer: An operating system manages and runs all of the hardware and software installed onto the computer.

Explanation:

It performs basic tasks such as file, memory, and process management, handling input and output, and controlling peripheral devices such as disk drives and printers.

Since the ntfs file system enjoys more widespread compatibility with other operating systems, it is often used on removable devices such sd cards and usb flash drives.
a. true
b. false

Answers

Answer: false

Explanation:

True or false: the basic input-output system (bios) updates for hewlett packard and dell are the only manufacturers whose bios codes can be mixed.

Answers

Answer:

false

Explanation:

After establishing fields and criteria, execute your query by clicking the _____ button in the _____ group.

Answers

After establishing fields and criteria, execute your query by clicking the Click the Run button in the Results group.

What is mean by query in SQL?

The term  query is known to be a kind of a request that is said to be made for data or information that can or that need to be obtained from a database table or combination of tables.

Note that this data may be made as results that are known to have been  returned by Structured Query Language (SQL) or as a kind of a pictorials, graphs or hard results,

Therefore, based on the above, After establishing fields and criteria, execute your query by clicking the Click the Run button in the Results group.

Learn more about query from

https://brainly.com/question/25694408

#SPJ1

In addition to oracle, another source of hypervisors for macos desktops is ________.

Answers

In addition to Oracle, another source of hypervisors for macOS desktops is Parallels. Therefore, the correct answer option is B. Parallels.

What is virtualization?

Virtualization can be defined as the creation of an abstract layer over computer hardware primarily through the use of a software, in order to enable the operating system (OS) such as macOS, storage device, server, etc., to be used by end users over the Internet.

In Cloud computing, some of the components (features) which is not required for a successful virtualization environment include the following:

Virtual machineHost machineHypervisors

In Macintosh computers, oracle and parallel are sources of hypervisors.

Read more on virtualization and hypervisors here: https://brainly.com/question/28528924

#SPJ1

Complete Question:

In addition to Oracle, another source of hypervisors for macOS desktops is _____. A. Microsoft B. Parallels C. Apple D. Intel. B. Host key.

create a comic strip about prepering hand tools for operation and safety

paaa helppp ​

Answers

Answer:

Hammer stools

ahsnsksns

The software/system that helps make sure the retail firm doesn't have a stockout is?

Answers

The software/system that helps make sure the retail firm doesn't have a stockout is supply chain management software.

Supply chain management is a software that comprehends all the techniques and processes that convert the starting material into the finished or final product. The supply chain management software is cost-effective and time-saving.

Creating a strategy, raw materials, manufacturing, distribution, and returns are the five important ingredients of supply chain management software.

The software helps the retail firm in improving customer service by ensuring that there is a continuous flow of the starting material so that the production process does not stop indefinitely which results in good relationships with the supplier and customer.

The software also performs the functions of processing customer requirements, sourcing, and shipping management.

To know more about supply chain management, click here:

https://brainly.com/question/28282152

#SPJ4

When the output (information) of an information system is used as new input it is called:____.

Answers

When the output (information) of an information system is used as new input it is called feedback.

What is information from a system that is used to make changes to the input?

The term feedback 'is seen as a form of output that is said to be used to make alterations to input or processing activities.

Note that a system is made up of the interrelated components that carry out a lot of tasks that is said to be perceived as feedback of the  information system.

Therefore, When the output (information) of an information system is used as new input it is called feedback.

Learn more about feedback from

https://brainly.com/question/25653772
#SPJ1

Computer vandalism falls under the computer as a ________ classification of computer crime.

Answers

Computer vandalism falls under the computer as a target classification of computer crime.

What is a computer crime?

A computer crime is sometimes referred to as cyber crime and it can be defined as a type of crime that typically involves the use of a computer system by a knowledgeable computer user (hacker or attacker) to gain an authorize access to a computer, in order to steal sensitive personal data (information) such as:

PasswordSocial Security NumberEmail address

What is computer as a target?

In Cyber security, computer as a target generally involves computer vandalism, denial of service, data alteration, network intrusions, and thefts of data (information).

Read more on computer crime here: https://brainly.com/question/13109173

#SPJ1

When error messages indicate that the windows registry is corrupted and you cannot boot from the hard drive, what tool or method is the first best option to fix the problem?

Answers

The tool or method is the first best option to fix the problem is Use bootable media to launch Windows RE and use System Restore to apply a restore point.

What is the command about?

If  Windows 7 registry is known to be corrupted and a person is unable to boot from the hard drive, one can be able to fix the problem by the use of commands that can be obtained from the Windows Recovery Environment to be used to recover the registry from backup.

Therefore, The tool or method is the first best option to fix the problem is Use bootable media to launch Windows RE and use System Restore to apply a restore point.

Learn more about Windows registry  from

https://brainly.com/question/10621447

#SPJ1

When error messages indicate that the Windows registry is corrupted and you cannot boot from the hard drive, what tool or method is the first best option to fix the problem? The second-best option?

Use bootable media to launch Windows RE and use System Restore to apply a restore point.

Use bootable media to launch Windows RE and perform a startup repair.

Use bootable media to launch Windows RE and then use commands to recover the registry from backup.

Refresh Windows using a system image or custom refresh image.

The unicode coding scheme supports a variety of characters including those for chinese, japanese, and arabic languages. True or false?.

Answers

The unicode coding scheme supports a variety of characters including those for chinese, japanese, and arabic languages is a True statement.

What is Unicode?

Unicode is known to be a kind of a modern standard that has been laid out from  text depiction that tells each of the letters as well as the symbols commonly used in the digital and print media.

Note that Unicode has been seen at the top as a good standard for identifying characters in any kind of  text in almost any language.

Therefore, The unicode coding scheme supports a variety of characters including those for chinese, japanese, and arabic languages is a True statement.

Learn more about coding   from

https://brainly.com/question/22654163

#SPJ1

What paradigm is this code based on? How do you know?
What does the number 16 mean in this code? How do you know?
Imagine you wanted to tweak the project so that the list produced by the program included teachers and kept track of how many years they have been working at the school. Using the principles of inheritance and overriding, explain how you could take this code and quickly create the new programs.
How could you apply some of the ideas, principles, or structures of coding to fields of study, industries, or tasks outside of creating computer programs? Propose at least one way to use “coding” or creating programs outside of computer science and explain how it uses coding-related concepts.
Imagine that you were programming without an IDE. What problems might you encounter?

Answers

Answer:

I Don't Know

Explanation:

nsjskdoeowowokskdnekmek biien

Select the 3 TRUE statements about storing digital images.

Group of answer choices

When storing the original file, use highest resolution possible if you are not sure how the images might be used.

Back up important documents on an external storage device.

Don't include descriptive information, version or size, and intended use information, as this increases file size.

Keep the original high resolution file in a separate place and make a copy to edit and process.

To get a higher resolution image of a low resolution picture, simply resave it at a higher resolution.

Answers

Answer:

When storing the original file, use highest resolution possible if you are not sure how the images might be used.Back up important documents on an external storage device.Keep the original high resolution file in a separate place and make a copy to edit and process.

Explanation:

The other two are incorrect. -->

Descriptive info hardly affects file size. In fact this should be a requirement to identify the image.

You cannot go from a lower resolution image to a higher resolution image, only the other way around

________ software allows the user to enter, organize, and store huge amounts of data and information.

Answers

Database management software allows the user to enter, organize, and store huge amounts of data and information.

What are databases management?

Database Management is known  to be a term that connote that which gives room for a person to be able to organize, save, as well as retrieve data from a computer.

Note that Database Management can also tell more about  the data storage, operations, as well as  security practices of a database administrator (DBA) in all of the life cycle of the data.

Therefore, Database management software allows the user to enter, organize, and store huge amounts of data and information.

Learn more about Database management  from

https://brainly.com/question/24027204
#SPJ1

reads a line of input, including leading and embedded spaces, and stores it in a string object.

Answers

A getline reads a line of input, including leading and embedded spaces, and stores it in a string object.

What is a Getline?

The term  C++ getline() is known to be a kind of  standard library function that  is known to be used by a programmer to be able to read a string or a line usually from an input stream.

It is said to be an aspect  of the <string> header. The getline() function tends to obtain or extracts characters from the input stream and attach it to the string object.

Therefore, A getline reads a line of input, including leading and embedded spaces, and stores it in a string object.

Learn more about string object from

https://brainly.com/question/17157424

#SPJ1

________ reads a line of input, including leading and embedded spaces, and stores it in a string object.

Select one:

a. cin.get

b. getline

c. cin.getline

d. get

e. None of these

Which new technology is a result of advances in artificial intelligence? O A. High-speed internet B. 5G networks C. Smart appliances D. Self-driving cars ​

Answers

The  new technology that is said to be a result of advances in artificial intelligence is known to be option D. Self-driving cars.

What is the artificial intelligence?

The term Artificial intelligence (AI) is known to be the ability or power of any given  computer or a robot that is said to be handled as well as controlled by a computer to be able to carry out tasks that are said to be often done by humans due to the fac that they need human intelligence and also their discernment.

Therefore, based on the above, The  new technology that is said to be a result of advances in artificial intelligence is known to be option D. Self-driving cars.

Learn more about artificial intelligence from

https://brainly.com/question/25523571
#SPJ1

Formatting codes can be added to documents using a(n)_____, such as slashes // and angle brackets < >.

Answers

Using a delimiter like slashes or angle brackets, formatting codes can be applied to documents.

What are boundaries and shading mean?

Word documents often utilize borders and shading to highlight specific passages of text and make them the reader's initial impression.

We can use Borders and Shading in MS Word to make written text, paragraphs, and other elements appear lovely and attractive.

Formatting codes can be used to apply formatting to documents using a delimiter like slashes or angle brackets.

In order to add formatting codes to documents, a delimiter like slashes or angle brackets can be used.

The complete question is:

Formatting codes can be added to documents using a ___ such as slashes and angle brackets

Learn more about the borders and Shading here:

https://brainly.com/question/1553849?

#SPJ1

when determining outsourcing fees, a has a variable fee based on the number of users or workstations that have access to the application.

Answers

When determining outsourcing fees, a subscription model has a variable fee based on the number of users or workstations that have access to the application.

What Is a Subscription Business Model?

Subscription business models are known to be those which are said to be based on the notion of selling a product or service to be able to get monthly or yearly subscription revenue.

Note that this model is one that is known to be focus on customer retention over the issue of customer acquisition.

Therefore, When determining outsourcing fees, a subscription model has a variable fee based on the number of users or workstations that have access to the application.

Learn more about subscription model from

https://brainly.com/question/14317614

#SPJ1

When determining outsourcing fees, a ____ has a variable fee based on the number of users or workstations that have access to the application.

what is the headgear for​

Answers

Answer:

headgear is an orthodontic appliance used to correct bite and support proper jaw alignment and growth

Given the variables x, y, and z, each associated with an int, write a fragment of code that assigns the smallest of these to min.

Answers

Given the variables x, y, and z, each associated with an int, a fragment of code that assigns the smallest of these to min. is given below:

if x<=y and x<=z:

   min=x

if y<=x and y<=z:

   min=y

if z<=x and z<=y:

   min=z

What is Programming?

This refers to the sequence of steps that are used to give commands to a computer system to execute a task.

Hence, we can see that Given the variables x, y, and z, each associated with an int, a fragment of code that assigns the smallest of these to min. is given below:

if x<=y and x<=z:

   min=x

if y<=x and y<=z:

   min=y

if z<=x and z<=y:

   min=z

Read more about fragment codes here:

https://brainly.com/question/15776278

#SPJ1

You have upgraded your aws support plan to the business support level. what is true of the business support plan?

Answers

The business support plan for AWS is one hour support on production system failure. AWS is stand for Amazon Web Services, Inc.

Governments, companies, and individuals can access on-demand cloud computing platforms and APIs through AWS, an Amazon corporation, on a metered pay-per-use basis. These cloud computing web services provide software tools and distributed computer processing power through AWS server farms.

One of these services is called Amazon Elastic Compute Cloud (EC2), which gives consumers access to a virtual computer cluster that is always reachable online. AWS services are delivered to customers through a global network of AWS server farms.

Learn more about AWS https://brainly.com/question/28145530?

#SPJ4

If 200.123.4.6 is a classful internet protocol (ip) address, what class is it in?

Answers

200.123.4.6 is a classful internet protocol (ip) address located in class C.

An IP address (internet protocol address) is a numeric representation. This numerical representation uniquely identifies a particular interface on the network.

Address in IPv4 that has a length of 32 bits. This allows a maximum of 4,294,967,296 (232) unique addresses. Addresses in IPv6 are 128-bits long, which allows for 3.4 x 1038 (2128) unique addresses.

The total usable address pools of both versions are subtracted by the various reserved addresses and other considerations.

IP addresses can also be defined as binary numbers but are usually expressed in decimal form (IPv4) or hexadecimal form (IPv6) to make it easier for humans to read and use them.

You can learn more about IP addresses here https://brainly.com/question/18722788

#SPJ4

What are components of the network effect in social media engagement? (choose every correct answer.) multiple select question. the exp

Answers

The components of the network effect in social media engagement are:

InformationNetworkDynamic

What is social media engagement?

The Definition of the term Social media engagement  is known to be a term that acts to measures all issues in regards to the public shares, the likes as well as the comments for any kind of online business as well as its social media efforts.

Note that the Engagement is one that is seen as a form of  historical common metric that is known to be used  for the examination of social media performance but it is one that do not  need to translate to sales.

Therefore, based on the above, one can say that The components of the network effect in social media engagement are:

InformationNetworkDynamic

Learn more about social media engagement  from

https://brainly.com/question/8360107

#SPJ1

Information

Network

Dynamic

Player

two examples of how scientists, technologists, engineers, and mathematicians may work together to create a new product

Answers

Answer:

Which places were Included in Nepal by Pratap. Singh Shah in his short rule

The level of the computer hierarchy that is composed of gates and wires is the ______.

Answers

The level of the computer hierarchy that is composed of gates and wires is Digital logic level.

The level of the computer hierarchy that is composed of gates and wires is the Digital logic level. This is the level where the computer's basic operations are performed. The digital logic level is made up of two main components: the control unit and the ALU.

The control unit is responsible for the management of the computer's resources and for controlling the sequence of operations within the computer. The ALU, or arithmetic logic unit, is responsible for performing the computer's arithmetic and logic operations.

All the basic operations performed by a computer, such as addition, subtraction, multiplication, and division, are implemented at the digital logic level.

Learn more on Digital logic level here:

https://brainly.com/question/8316419

#SPJ4

Other Questions
Every presentation should have a clear goal.TrueFalse A client calls to cancel an appointment for the first prenatal visit after reporting a home pregnancy test is negative. which instruction should the nurse prioritize? What would be the average fixed cost per unit at an activity level of 5,200 units? assume that this level of activity is within the relevant range. Exercise 1 Underline the adjective clause, and circle the noun or pronoun it modifies.The stairs that led to the attic were creaky. In a diploid organism with 12 chromosomes, how many different arrangements of chromosomes can be generated by independent assortment? Which word is used by a state college to determine whether a student pays in-state or out-of-state tuition? The theory that people adapt to the values of the subculture to which they belong is? 1. Describe a shantyboat-dimensions, construction, cost, etc if correct will mark brainliestThe beaker and the graduated cylinder are both holding liquids. The beaker has lemonade and the cylinder has grapefruit juice. What statement best compares the two liquids? (2 points)a tall narrow cylinder and a short wide beaker with one hundred milliliters of yellow liquid in themGroup of answer choicesThe mass of the liquid does not change if the volume of the liquid changes.The volumes of the two liquids are exactly the same.The volume of the liquid in the beaker is greater because it is short and round.The volume of the liquid in the graduated cylinder is greater because it is taller and narrower. Gunawa ng slogan na may pagpapaliwanag sa mga sulosyon ng man made at natural disaster Find the first four multiples of 15. Supplies that are not used immediately are recorded as a(n) ______ when purchased. A&A historian is writing a book about "The Alamo". This is an example ofwhich one?A)Primary source (fuente principal)B) Secondary source (fuente secunaria)C) ResponsibilityD) Right The linked set of activities required to design, produce, and deliver products and provide aftermarket service to customers is called the:_____. The theory that culture is held together by a series of important elements such as economy, education, religion, kinship, and politics that all serve to maintain societal equilibrium is known as? Persons with __________ blood have neither antigen a nor antigen b on their red blood cells but have antibody anti-a and antibody anti-b in their plasma. What is the limiting reactant if 0.5 g Al is reacted with 0.5 g CuCl2?What is the theoretical yield of copper produced by this reaction? help pls no rubbish answer pls what do you mean by death rate I need helpWhat is x/10 = 4