1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesna [10]
2 years ago
11

2. During the information-gathering process, you want to make sure you address a list of highly technical questions concerning t

he overarching system already in place. Which method would be
ไง ดี
A. Review of business documents
B. Interviews
. C. Questionnaires
D. Work shadowing
Mark for review (Will be highlighted on the review page)
Computers and Technology
1 answer:
zalisa [80]2 years ago
3 0

Answer:

A. Review of business documents

Explanation:

In information gathering process some research or resolving some technical issue, it is necessary to gather data or enlist highly technical questions concerning the overarching system that is already in place.

To gather answers that are enlisted above can be answered with the help of literature review or review of business document.

Literature review is the review of past work related to some particular topic that can be gather from different journal articles, conference publications or book.

You might be interested in
You want to securely erase data from your hard drive what can you use to do this and what is the process called
tankabanditka [31]
You could Factory Reset a computer or you could smash it with  a hammer
7 0
2 years ago
Read 2 more answers
How could social media have a negative impact if not used properly when seeking employment
castortr0y [4]
Before hiring someone, employers often check the social media pages of people applying for a job. If their social media account has content not up to the company's standards, they may not get the job. 
8 0
3 years ago
In an ipv4 address, what are the maximum number of bits that can be used to identify the network address
Solnce55 [7]
Up to 24 bits can be used to identify unique <span>networks.</span>
5 0
3 years ago
How does a router handle a packet destined for a network that is not listed in the routing table?
kogti [31]
The packet is dropped or discarded. By default, a router will send packets to a network that has been listed in the routing table. If it happens that the network is not listed, the packet will be discarded or dropped. Packets that do not have a default route or gateway of last resort are dropped.

 






5 0
3 years ago
In some video games, the player cannot obtain the reward without doing what with something that they already have?
Crank

Answer:

risking

Explanation:

8 0
2 years ago
Other questions:
  • You do not need to use any functions beyond the main function in this problem. Initialize an array of int with the values: 4, 6,
    12·1 answer
  • You notice that lately your computer has been running slow. When you open up your web browser, you get endless pop-up ads to the
    8·1 answer
  • Is backing up computer files done on the hard drive?
    5·1 answer
  • Ruby is creating a presentation. She wants each slide displayed at intervals of five seconds. Which feature in the presentation
    6·2 answers
  • wHAT ARE THE 5 LAYERS in the internet protocol stack andwhat are the principal responsibilities of eack of theselayers.?
    12·1 answer
  • An ftp ____ is a computer that allows users to upload and/or download files using ftp.
    5·1 answer
  • what notation system supports presenting the largest numbers using fewest digits; Binary, decimal or hexadecimal?
    11·1 answer
  • What are the two types of computer keyboards and how are they different?
    6·2 answers
  • Consider the following code segment.
    11·1 answer
  • Which of the following is a primary disadvantage of using a GUI HTML editor to develop your Webpages?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!