1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRissso [65]
3 years ago
7

Consider what fact-finding techniques you would use to identify the important facts needed to develop a database system. Please

consider at least 4 methods and compare the advantages and the disadvantages of each method
Computers and Technology
1 answer:
8090 [49]3 years ago
3 0

Answer:

Examples of Fact-finding techniques includes:

  1. Prototyping
  2. Questionnaires
  3. Research and sites visit
  4. Interviews

Explanation:

It is important to note that a database system is a tool that allows users to define, create, maintain, and control access to a collection of logically related data and description of these data, designed to meet the information needs of an organization.

<u>Prototyping </u>

<em>Advantage:</em>  enables testing and understanding of the system in advance before final implementation of solution, while requiring less time for research.

<em>Disadvantage:</em> Training and Development cost consumes resources.

<u>Research and site visit </u>

<em>Advantage :</em> better time management if the problem has been researched upon before.

<em>Disadvantage:</em> appropriate permission is often needed before using research materials.

<u> Questionnaires </u>

<em>Advantage: </em>This technique is not expensive, and responses can be calculated and analysed quickly.

<em>Disadvantage:</em> There may be Incomplete answers received from users and body language of user cannot be observed.

<u>Interviews</u>

<em>Advantage:</em> The body language of interviewees is been perceived.

<em> Disadvantage: </em>Interviewing is time consuming and costly.

You might be interested in
5 provisions of computer ethics
Taya2010 [7]

Answer:

1.-Your computer or system should not be used to harm others.

2.-Your cyber knowledge should not be used to steal other people's resources.

3.-One should not use or copy softwares for which you have not paid.

4.-You should not break into someone else's accounts.

5.-Never use other people's resources without their consent.  

brainliest please ;)

7 0
4 years ago
Translate each of the following binary representations into its equivalent base ten representation.
Semenov [28]

Answer:

12, 2.375, 0.25, 17

Explanation:

A. 2^3 + 2^2 = 12

B. 2^1 + 2^-2 + 2^-3 = 2.375

C. 2^-2 = 0.25

D. 2^4 + 2^0 = 17

3 0
4 years ago
Top-down programming divides a very large or complex programming task into smaller, more manageable chunks.
vekshin1

Answer:

A

Explanation:

Top-down is a programming style, the mainstay of traditional procedural languages, in which design begins by specifying complex pieces and then dividing them into successively smaller pieces.

5 0
3 years ago
Why is monitoring email, voice mail, and computer files considered legal?
Sati [7]

Explanation:

Monitoring someone's emails,voice mails and computer files is considered is illegal because you are accessing someone's personal information which is not regarded as  ethical .

There are certain reasons where one's email,voice mails and computer files can be monitored are as following:

  1. Protect the security information and security.
  2. Investigation of complaints of harassment.
  3. Preventing personal use of employer's facilities.
6 0
3 years ago
Simple mail transfer protocol (smtp) uses the well-known port number ______________ by default.
Elden [556K]
I believe it's default is port 587. 
8 0
4 years ago
Read 2 more answers
Other questions:
  • Which of the following is an extension of the fill pattern Sunday,Tuesday?
    10·2 answers
  • For a wire with a circular cross section and a diameter = 3.00mm calculate the following: (m means meter. mm means millimeter. c
    5·1 answer
  • A user who has special security and access to a system, such as the right to assign passwords, is called a ____.​ a. ​ technical
    8·1 answer
  • What feature adjusts the top and bottom margins so that the text is centered vertically on the printed page?
    14·1 answer
  • Write a function that takes an integer value and returns the number with its digits reversed. for example, given the number 7631
    10·1 answer
  • Name the box where the name of the first cell of the selected range appears?
    7·1 answer
  • Line 9 and 10
    15·1 answer
  • Which important aspect of the Roman Empire did the barbarians destroy?
    14·2 answers
  • Choose the term that best matches each definition.
    7·1 answer
  • Please help 2 lazy to do! easy question
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!