1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maxonik [38]
2 years ago
11

John has recently retired from an administrative, yet technical job which he held for 40 years. He decided to pursue a life-long

dream – leather works. John’s life-long dream quickly became a booming business and orders for purses, shoes, bags, and belts were streaming in. You, being a nifty IT student, you quickly saw how you could develop a system that would help John manage his business.Q.1.1 Identify three benefits that John will reap from the implementation of a computerized system for his business. (3)
Computers and Technology
1 answer:
kvv77 [185]2 years ago
7 0

The benefits that John will reap from the implementation of a computerized system for his business include the following:

  • 1. It will help in enabling a faster and more effective process.
  • 2. Develop a better relationship with customers.
  • 3. Increase in revenue.

  • It should be noted that computer is vital for a business as it can help in developing faster and more effective processes. In such a case, an individual can spend lesser time with a particular work.

  • Also, a better relationship is developed with the customers. One can have a platform whereby the consumers can order shoes, bags, etc online. This is vital in enhancing the relationship with customers.

In conclusion, using a computer is also got in the generation of more revenues.

Read related link on:

brainly.com/question/15980664

You might be interested in
How would you compare and contrast the impact of the printing press with the impact of the internet?
Ilia_Sergeevich [38]
<span>The impact of the printing press with the impact of the internet is that </span>internet is an easy access compared with the printing press. Changes affect society, there are more ways to access info today through the internet.  internet spreads information faster and can be shared quickly.  
4 0
3 years ago
opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use
Alekssandra [29.7K]

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

  1. General Policies
  2. Server Policies
  3. VPN Policies
  4. Back-Up Policies
  5. Firewall Access and Configuration Policies

Cheers!

5 0
3 years ago
Define computer architecture?
tia_tia [17]

Answer:

computer architecture is a set of rules and methods that describe the functionality, organization, and implementation of computer systems. The architecture of a system refers to its structure in terms of separately specified components of that system and their interrelationships.

4 0
2 years ago
Alan is the security manager for a mid-sized business. The company has suffered several serious data losses when mobile devices
Kipish [7]

Disk encryption is highly risky response.

<u>Explanation:</u>

To protect or loss of serial data loss on mobile devices it is not advisable to implement full disk encrypted. Once full disk encrypted is implemented mobile access is very slow. End-user will complain to IT administrator.

Best solution either removes unwanted or unauthorized application from mobile to protect the data loss. Install antivirus program in each mobile.

Access or permission to application is removed so that mobile data loss can be avoided.  End user should also be advised not to click on any link which they receive through SMS messages or other through any applications.

5 0
3 years ago
Martha is a network monitoring technician working on a firewall for her company’s network. To filter traffic going through the f
tia_tia [17]

Answer:

D

Explanation:

Not much of a tech person, but protocol then firewall seems the most reasonable.

7 0
3 years ago
Read 2 more answers
Other questions:
  • ________ computers are specially designed computer chips that reside inside other devices, such as a car. Select one: A. Tablet
    11·2 answers
  • For an external usb hard drive attached to a computer, which is more suitable: a writethrough cache or a block cache
    14·2 answers
  • Select the correct answer.
    6·1 answer
  • Enna always says thank you when people give her gifts. She even writes thank-you cards. On holidays, Enna remembers
    9·1 answer
  • How Do you get Splatoon two for free
    6·2 answers
  • Write a program that gets a list of integers from input, and outputs the integers in ascending order (lowest to highest). The fi
    5·1 answer
  • This is 6th grade career class.
    10·1 answer
  • In java
    6·1 answer
  • What are the benefits and risks of a client-server network?
    5·1 answer
  • Do you have any sprites for Friday Night Funkin?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!