Answer:
Examples of Fact-finding techniques includes:
-
Prototyping
-
Questionnaires
- Research and sites visit
-
Interviews
Explanation:
It is important to note that a database system is a tool that allows users to define, create, maintain, and control access to a collection of logically related data and description of these data, designed to meet the information needs of an organization.
<u>Prototyping
</u>
<em>Advantage:</em> enables testing and understanding of the system in advance before final implementation of solution, while requiring less time for research.
<em>Disadvantage:</em> Training and Development cost consumes resources.
<u>Research and site visit </u>
<em>Advantage :</em> better time management if the problem has been researched upon before.
<em>Disadvantage:</em> appropriate permission is often needed before using research materials.
<u> Questionnaires
</u>
<em>Advantage: </em>This technique is not expensive, and responses can be calculated and analysed quickly.
<em>Disadvantage:</em> There may be Incomplete answers received from users and body language of user cannot be observed.
<u>Interviews</u>
<em>Advantage:</em> The body language of interviewees is been perceived.
<em>
Disadvantage: </em>Interviewing is time consuming and costly.
Instance
-------------------------
Answer:
3. ReFS
Explanation:
Only in ReFS include and others do not have all of the below features
1. Automatic integrity checking and data scrubbing
2. Removal of the need for running chkdsk
3. Protection against data degradation
4. Built-in handling of hard disk drive failure and redundancy
5. Integration of RAID functionality
6. A switch to copy/allocate on write for data and metadata updates
7. Handling of very long paths and filenames
8. Storage virtualization and pooling
Answer:
The answer to this question is option "d".
Explanation:
In this question option d (A user fills out a form to construct a description of the data desired in a SQL search) is not true. Because SQL stands for Structured Query Language. This is a query language used to communicate with a database and a user fills the form. Which is not possible in the SQL. So the option d is not true.
Try restating system software and delete anything that may have caused the online fraud then remove all credit cards and info on the device. Tell the authorities and get a new device and email with a software protector. When doing this DO NOT DO WHAT YOU ORIGINALLY DID TO GET VICTIMIZED AND (DON'T TRY TO SIGN INTO YOUR PREVIOUS EMAIL ON A NEW DEVICE)