State three modules in HansaWorld and briefly describe what each is used for. (6)
2. With an example, explain what settings are used for. (3)
3. What is Personal Desktop and why is it good to use? Mention two ways in which an
entry can be deleted from the personal desktop. (6)
4. Describe how you invalidate a record in HansaWorld (3)
5. Briefly explain what specification, paste special and report windows are used for. (6)
6. How many reports can you have on the screen at once? How many reports does
HansaWorld have? (4)
7. Describe any two views of the Calendar and how you can open them (4)
8. Describe three (3) ways in which records can be attached to Mails. (6)
9. Describe the basic SALES PROCESS where there is no stock involved and how the
same is implemented in HansaWorld. (12)

Answers

Answer 1

1. We can see here that the three modules in HansaWorld and their brief descriptions:

AccountingInventoryCRM

2. We can deduce that settings are actually used in HansaWorld for used for configuring the system to meet specific business requirements.

What is HansaWorld?

It is important for us to understand what HansaWorld is all about. We can see here that HansaWorld is actually known to be an enterprise resource planning (ERP) system that provides integrated software solutions for businesses.

3. Personal Desktop is actually known to be a feature in HansaWorld. It allows users to create a personalized workspace within the system.

It can help users to increase their productivity and efficiency.

4. To actually invalidate a record in HansaWorld, there steps to take.

5. We can deduce here that specification, paste special and report windows help users to actually manage data and generate report.

6. There are factors that play in in determining the amount of reports generated.

7. The Calendar on HansaWorld is used to view upcoming events. There is the Day View and there is the Month View.

8. We can see that in attaching records, HansaWorld allows you to:

Drag and drop.Insert linkUse the Mail Merge Function

Learn more about report on https://brainly.com/question/26177190

#SPJ1


Related Questions

Nigeria Amateur Volleyball Association was formed in what year​

Answers

Answer:

The Nigerian Amateur Volleyball Association was formed in 1969.

PLS MARK BRAINLIEST

Explanation:

Answer:

1969

Explanation:

The Nigerian Amateur Volleyball Association was formed in 1969.

What formatting changes do spreadsheet applications permit in the rows and columns of a spreadsheet?
Row and Column Formatting Options
Formatting rows and columns is similar to cell formatting. In an OpenOffice Calc spreadsheet, you can format data entered into rows and columns with the help of the Rows and Columns options. You can insert rows and columns into, or delete rows and columns from, a spreadsheet. Use the Insert or Delete rows and columns option on the Insert tab. Alternatively, select the row or column where you want new rows or columns to appear, right-click, and select Insert Only Row or Only Column options.

You can hide or show rows and columns in a spreadsheet. Use the Hide or Show option on the Format tab. For example, to hide a row, first select the row, then choose the Insert tab, then select the Row option, and then select Hide. Alternatively, you can select the row or columns, right-click, and select the Hide or Show option.

You can adjust the height of rows and width of columns. Select Row and then select the Height option on the Format tab. Similarly, select Column, then select the Width option on the Format tab. Alternatively, you can hold the mouse on the row and column divider, and drag the double arrow to the position. You can also use the AutoFit option on the Table tab to resize rows and columns.

Answers

Formatting rows and columns in a spreadsheet is similar to cell formatting. In OpenOffice Calc, users can insert or delete rows and columns, hide or show them, and adjust the height and width of the rows and columns.

What is spreadsheet?

A spreadsheet is an electronic document that stores data in a tabular format and is used to perform calculations and analysis. It is a type of software program designed to assist with data entry, calculations, and other analysis tasks. Spreadsheets often contain formulas and functions that allow users to quickly and accurately calculate values based on the data they enter. Spreadsheets also provide users with the ability to present data in an organized and visually appealing way. Spreadsheets are an essential tool for businesses, schools, and other organizations to help them make decisions, track progress, and manage resources.

Users can access these options from the Insert, Format, and Table tabs. Alternatively, they can select the row or column they want to format, right-click, and select the relevant option. Additionally, users can hold the mouse on the row or column divider and drag the double arrow to the desired position. The AutoFit option on the Table tab can also be used to resize rows and columns.

To learn more about spreadsheet
https://brainly.com/question/30039670
#SPJ1

verom each drop-down menu. Raymond is assigned the task of backing up the data on a web server. However, he has limited storage place on the backup media.. Which type of backup should he choose and how would it benefit him?


Raymond should select a(n)_______backup.

The benefit of using this type of backup is that there is______.​

Answers

Raymond should select a(n) incremental backup.

The benefit of using this type of backup is that there is a lower storage space requirement compared to a full backup. Incremental backups only copy the data that has been changed since the last backup, which means that they require less storage space than a full backup that copies all the data every time. This allows Raymond to back up the web server's data more frequently and efficiently, with less strain on the storage media.

3. In your own opinion, with all the policies and procedures being made or created and perfected, why is it that these rules are still being violated or abused

Answers

With all the policies and procedures being made or created and perfected, the reason these rules are said to be still being violated or abused are:

Lack of AwarenessHuman Error

What are the policies?

Lack of Awareness  is one that shows that even if there are policies as well as procedures that are said to be made and perfected, people or employees can not be fully made known of them and as a result can bring about  unintentional form of  violations or abuse.

Lastly in terms of Human Error, one need to know that people's Mistakes or lapses can be seen in terms of judgment  and this can lead to abuse also.

Learn more about policies from

https://brainly.com/question/3006046

#SPJ1

Select the correct answer from each drop-down menu.
Lucy wants to add some notes in her research paper that provide additional information to the reader. She also wants to display her university logo on all the pages as part of the title. What formatting can she apply to her document to include these details?
Lucy can display her notes in the form of a . She can indicate the logo as part of the .

Answers

Lucy can display her notes in the form of a footnote or endnote

She can indicate the logo as part of the header or footer section.

What is a Footnote?

This refers to the bottom of a page is where footnotes are located. They provide references or offer commentary on a specific passage of material above it. Say, for instance, that you want to add a thought to a sentence you have written, but the thought has nothing to do with the thesis of your paragraph.

Hence, it can be seen that for Lucy to accurately add her notes, she has to add them as a footnote or end note and would be placed in the header or footer section for her logo.

Read more about logo here:

https://brainly.com/question/22856492

#SPJ1

1. What would be the best explanation of the variable name 'int indexSize'?
a. Shows the number in the index is big
b. Holds the number in the last index spot
c. Holds the number in the first index spot
d. Holds the number of indexes in the array

Answers

1The option that would be the best explanation of the variable name 'int indexSize' is option d. Holds the number of indexes in the array

What is the variable about?

The variable name 'int indexSize' is one that tells that it have the number of indexes in an array.

Note that The use of the term "indexSize" is one that tells that it stand for the size or the amount of the indexes in the array, and thus it is one that is telling the total number of indexes as well as the elements that is seen in the array.

Therefore, It is common work in programming to be able to make use of variable names that are said to be descriptive.

Learn more about variable from

https://brainly.com/question/28248724

#SPJ1

Consider that you have a code of 200,000 instructions which is executed using a 16 stages pipeline. It is expected that 20% of the instructions will cause an exception. In order to handle the exception, there is an exception handler which is using 20 cycles to execute (includes the flushing and reloading and the actual handling of the exception). The pipeline frequency is 2 GHz

i) How many cycles does it take to execute the code?

ii) What is the average CPI for this code?

iii) How long does it take to execute the code?

Answers

Answer:

i) The total number of cycles required to execute the code can be calculated as follows:

Total number of instructions = 200,000

Number of instructions causing exceptions = 20% of 200,000 = 40,000

Number of instructions without exceptions = 200,000 - 40,000 = 160,000

Cycles required for instructions without exceptions = 160,000 x 16 = 2,560,000

Cycles required for instructions causing exceptions = 40,000 x (16 + 20) = 1,440,000

Total number of cycles required = 2,560,000 + 1,440,000 = 4,000,000 cycles

ii) The average CPI (Cycles Per Instruction) can be calculated as follows:

Total number of cycles required = 4,000,000 cycles

Total number of instructions executed = 200,000 instructions

Average CPI = Total number of cycles required / Total number of instructions executed

= 4,000,000 / 200,000

= 20 cycles per instruction

iii) The time required to execute the code can be calculated as follows:

Total number of cycles required = 4,000,000 cycles

Pipeline frequency = 2 GHz

Time required to execute the code = Total number of cycles required / Pipeline frequency

= 4,000,000 / 2,000,000,000

= 2 milliseconds

To execute the code using a 16-stage pipeline, each instruction will take 16 cycles. Therefore, the total number of cycles required to execute 200,000 instructions is: 3,200,000 cycles.

What is CPI?

CPI stands for Cycles Per Instruction. It is a metric used to measure the efficiency of a computer's instruction processing. The lower the CPI, the more efficiently the computer is processing instructions.

Each instruction will take 16 cycles to execute using a 16-stage pipeline. As a result, the total number of cycles required to execute 200,000 instructions is as follows:

200,000 times 16 = 3,200,000 cycles

The percentage of instructions causing an exception is 20%, so the average CPI can be calculated as:

Average CPI = (Ideal CPI x Percentage of Instructions without Exceptions) + (Cycles per Exception x Percentage of Instructions with Exceptions)

Average CPI = (1 x 0.8) + (20 x 0.2)

Average CPI = 4.4 cycles per instruction

The length of time it takes to execute the code can be calculated using the following formula:

Execution Time = (Number of Cycles x Cycle Time)

Since the pipeline frequency is 2 GHz, the cycle time is:

Cycle Time = 1 / 2 GHz = 0.5 ns

Therefore, the execution time is:

Execution Time = (3,200,000 + (0.2 x 200,000 x 20)) x 0.5 ns

Execution Time = 1,640,000 ns

Thus, it takes 1,640,000 nanoseconds to execute the code.

For more details regarding CPI, visit:

https://brainly.com/question/14453270

#SPJ2

Formal Writing Assignment: CUNY WAN Modernization Project Spring 2023
The CUNY University System has begun developing programs for enterprising professionals and advanced degree students that want to complete their studies remotely. This emerging need originated when the CUNY University System was operating fully remote due to the Corona virus. There is significant interest in continuing to provide this remote mode of instruction and expand it to new outreach programs within the New York City region. The CUNY University System has hired you to provide help with their modernized WAN that will be needed for developing these new programs.

Providing WAN Services to Remote locations
CUNY University System plans to offer night and weekend classes for professionals and advanced degree students, paralegal students, and nurses, in five “Centers of Excellence” remote locations at each borough of the City of New York.. Its plan is to have professors offer the classes from the main campus site and to use video conferencing and multimedia options at these “Centers of Excellence” remote sites. The CUNY University System main site has a TCP/IP Ethernet network. The remote “Centers of Excellence” sites, which are not yet set up, will also have TCP/IP Ethernet networks.
The CUNY University System Director of Information Technology is asking you to write a proposal for three WAN options (possible candidates are: Frame Relay, Broad Band and MPLS) to connect the “Centers of Excellence” remote sites to the main campus and provide a rationale for each of these options. Your WAN options must provide for the use of voice over IP, video conferencing and multimedia applications. Each WAN option should provide details on the following factors:
 How does the technology work?
 Bandwidth costs
 Bandwidth allocation (how much bandwidth is available/supported) by the method.
 Equipment costs associated with the method.
 Ability for the method to address future expanded bandwidth requirements.
 Ability for the method to incorporate other applications such as voice and video.
 Ability for the method to offers fault tolerant options to provide more guaranteed uptime—an important consideration for providing long-distance learning.
Teaching Classes from Home
The CUNY University System president enjoys participating in several classes once a week as a guest speaker or mentor, but she wants to do this from home, so she can spend more time with her family instead of driving back to the main CUNY University System campus, which is about ten miles away.
Write a 1–2-page letter to the CUNY University System president explaining how she might be connected to the main CUNY University System campus network through a particular WAN technology, and why you recommend that WAN technology. One of the requirements is that she needs to be able to use the telephone in her home office while she is connected to the CUNY network.
WAN Connectivity for a Business Incubator
The CUNY University System is starting a business incubator on the main campus. The business incubator provides one year of resources for up to five new small businesses, including a business location and office resources, such as computers, printers, scanners and Internet access. Write a 1–2-page letter to the CUNY University System president explaining to her the WAN connectivity options that are most appropriate for these small businesses, so that it is consistent with what they can use when they leave the incubator facilities.

Answers

In order to carry out this assignment, you want to make sure that you research and thouroughly understand the Wide Area Network (WAN) techologies of Frame Relay, Broad Bank, and MPLS.

What else needs to be done?

You must present a proposal for each WAN alternative, describing the bandwidth prices, allocation, equipment costs, capacity to handle future bandwidth requirements, include audio and video, and offer fault-tolerant choices.

You would need to submit a letter outlining the proposed WAN technology to link her to the campus network while enabling her to use her phone in response to the CUNY University System president's request to participate in classes from home.

You would also need to produce another letter for the business incubator describing the best WAN connectivity alternatives for small enterprises to use once they depart the incubator facility. Thus,, the project necessitates good research abilities as well as the ability to communicate material clearly and concisely.

Learn more about WAN:
https://brainly.com/question/621746
#SPJ1

Write a program that displays the number array below as an output. Use only do while
loop. N is a number entered by an user.

13 19 25 31 37 43 49 … N

Answers

Here's the Python code to solve the problem using a do-while loop:

n = int(input("Enter a number: "))

num = 13

print(num, end=" ")

while True:

num += 6

if num > n:

break

print(num, end=" ")

pretend it is 2012, describe two companies that still exist
and tell me why you think they did well in the last 10 years. These should be stocks that are publicly traded. You can purchase stocks on NASDAQ and the New York Stock Exchange.

Answers

Answer:

One company that still exists and has done well in the last 10 years is Apple Inc. (AAPL). Apple is a publicly-traded company that produces consumer electronics, computer software, and online services. In the last 10 years, Apple has continued to innovate and release new products, such as the iPhone, iPad, and Apple Watch. These products have been very successful, and have helped Apple become one of the most valuable companies in the world. Additionally, Apple has a loyal customer base and a strong brand, which has helped it maintain its position in the market.

Another company that still exists and has done well in the last 10 years is Amazon.com, Inc. (AMZN). Amazon is a publicly-traded company that operates an online marketplace and provides cloud computing services. In the last 10 years, Amazon has continued to grow and expand, both in terms of its product offerings and its geographic reach. Amazon has also invested heavily in new technology, such as artificial intelligence and robotics, which has helped it stay ahead of the competition. Additionally, Amazon has a strong focus on customer service and satisfaction, which has helped it build a loyal customer base and maintain its position as a leader in the e-commerce industry.

Fill in the blank after egrep to get output on matrix exactly as shown

$ egrep "_____________" ~mark.fernandes/pub/notes/data/cars

plym fury 77 73 2500
chevy nova 79 60 3000
volvo gl 78 102 9850
Chevy nova 80 50 3500
fiat 600 65 115 450
honda accord 81 30 6000
toyota tercel 82 180 750
chevy impala 65 85 1550


NO quotes. Use as few characters as you can to get the output above.
Answer does not use egrep options. Keep trying as many answers exist.

HINT: Use answer(s) from previous question(s) for clues to solve this
question except these blanks use regex not egrep options and no quotes.

Answers

One possible answer to the above output is:

ruby

(?i)chevy nova.*$

What is the output  about?

(?i) - This is a flag for case-insensitive matching, which allows "Chevy" to match both "Chevy" and "chevy".

chevy nova - This is the literal string "chevy nova".

.*$ - This matches any characters (.*) until the end of the line ($), effectively capturing the entire line that contains "chevy nova".

The regex pattern that fills the blank is:

css

^.{4}\b

The output of the command will be:

yaml

plym fury 77 73 2500

chevy nova 79 60 3000

volvo gl 78 102 9850

Chevy nova 80 50 3500

fiat 600 65 115 450

honda accord 81 30 6000

toyota tercel 82 180 750

Therefore, The ^ character matches the beginning of the line. The .{4} pattern matches any character (except for a newline) exactly 4 times. This matches the first four characters of each line in the input.

Read more about output  here:

https://brainly.com/question/14352771

#SPJ1

Other Questions
1. Explain what is wrong with the encryption scheme used by WEP. 2. Describe the authentication protocol that WEP employs to authenticate a wireless host to a wireless AP (given that the two have a pre-shared symmetric key). Show an attack on this protocol. That is, show how an attacker, who does not have access to the key shared between a host and an AP, can impersonate the host cubital fossa contents from lateral to medial: what is health promotion (injury prevention-bodily harm): toddler (1-3 yrs) Arguments are input. If u want to find arguments in ur own functions u make, how do u do that? Schwartz's second bipolar dimension includes openness to ___ and ___. In order to find whether you have the correct citation, what should you type in front of your citation to ensure that it runs a find? Please answerrrrrrrrrrr according to the big mac index above, what would be the price of big mac in local currency in france as of april 2001? Make up two data sets. List all the values in each dat set and write a story to describe where they may have come from. The data sets should meet the following conditions:- The data should come from random samples taken from a population- The centers of the distributions should be similar - The variables of the distributions should be different Pls show work Explain why the initial value of any function of the form f(x) =a(b^x) is equal to a (1) What is the influence of the lotos flowers?(a) The flower specifically targets sailors.(b) The flower's effects can be felt everywhere.(c) The flower is easy to escape once eaten.(d) The flower has a reassuring presence that calms the sailors. An air conditioner with a coefficient of performance of 3.50 uses 30.0 KW of power to operate. What power is t discharging to the outdoors? A75.0kW OB. 210 KW O c. 135 kW O D. 30.0 kw O E. 105 kw How to find the length of the segment indicated? In a certain population of 100 deer, 34 births and 25 deaths were recorded in one year. Assuming no immigration or emigration occurred, what is r for that population? Triangle ABC is rotated 180 counterclockwise about the origin. Then it is translated to the right 4 and up 4. What are the new coordinates of point C? Determine if the image of Triangle ABC is similar or congruent to the original triangle A company wants to establish an assembly line for producing a new product, the Personal Digital Assistant (PDA). The tasks, task times, and immediate predecessors for the tasks are as follows: TASK TIME (sec) IMMEDIATE PREDECESSORS A 12 B 15 A C 8 A D 5 B, C E 20 D. Company goal is to produce 180 PDAs per hour. a. What is the cycle time? b. What is the theoretical minimum for the number of workstations that can achieve in this assembly line? c. Can the theoretical minimum actually be reached when workstations are assigned? Outline how a sub-procedure can be considered an example of abstraction. adults who are born blind but later have their vision restored A) are almost immediately able to recognize familiar objects.B) typically fail to recognize familiar objects.C) are unable to follow moving objects with their eyes.D) have excellent eye-hand coordination. Silver Stirrup Horse Rescue is going to paint the front of the big red barn. The triangular top portion of the barn is 20 feet across and 8 feet tall. The rectangular bottom portion is also 20 feet across, buts its 13 1/2 feet tall. The rescue will use extra-double gallons of paint that cover over 100 sq ft each.How many gallons of paint does the rescue need to cover the entire front of the barn?Write your answer as A Whole Number, Proper fraction or Mixed Number What did the plastic industry say about the techniques for cleaning and sorting plastic waste in private?