1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
3 years ago
12

Which of the following is not an important consideration before a business invests in a particular technology?

Computers and Technology
1 answer:
Sergio [31]3 years ago
6 0
When investing in technology there are four types of feasibility to look for, economic feasibility which determines if the benefits outweigh the costs, operational feasibility which determines if the system is used the way it is intended, technical feasibility which determines if the technology exists to make the new system work, and schedule feasibility which determines if the technology can be implemented in a timely manner.

The only answer that does not fit one of these feasibilities is C) How does it look?
You might be interested in
What is a spreadsheet program?<br> A spreadsheet program is a computerized version of_________.
BabaBlast [244]
I dont know what exact answer youre looking for because you didnt provide options but..
"A spreadsheet<span> is </span>a sheet<span> of paper that shows accounting or other data in rows and columns; </span>a spreadsheet<span> is also a </span>computer<span> application </span>program<span> that simulates a physical </span>spreadsheet<span> by capturing, displaying, and manipulating data arranged in rows and columns."</span>
3 0
3 years ago
Read 2 more answers
You are photographing your friend in a local park which of the following might be supporting details you want to include in the
rodikova [14]

The color of the leaves. or the scenery

5 0
3 years ago
Question 1 :George, a user, is having trouble connecting to network resources, including shared folders on the local network and
vazorg [7]

Complete Question:

George, a user, is having trouble connecting to network resources, including shared folders on the local network and Internet resources. Yesterday he was able to connect with no problems. You need to ensure that he can connect to these resources. Which tool should you use FIRST?

Group of answer choices

A. ipconfig

B. Device Manager

C. My Network Places

D. Control Panel

Answer:

A. ipconfig

Explanation:

As a network administrator, to ensure that George can connect to the network resources, shared folders, and internet resources, the tool you should use first is the "ipconfig" in the command line. This is a troubleshooting process that would help to identify the problem and to establish a theory of probable cause.

<em>Since George could connect the previous day without any problem, it is most likely that the TCP/IP settings has been altered. Therefore, to view this settings you'll have to use an ipconfig command. </em>

4 0
3 years ago
HELP I WILL GIVVE BRAINLY AND 15 POINTS
levacccp [35]

Answer:

Because someone was hittting the space bar in the message instead of typing letters and numbers

Explanation:

Because they were bored or it was a glitch

4 0
3 years ago
What are the layers in the internet protocol stack? what are the principle responsibilities of each of these layers?
Andrew [12]
1: Application
2: Presentation
3:Session
4: Transport
5:Network 
6: Data link 
7: Physical

Application is a Interface Layer and responsible Layer
<span />
3 0
3 years ago
Other questions:
  • In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the
    11·1 answer
  • Which of the following would an interactive media proffessional must likely need
    9·1 answer
  • It is better to know the main components of all computer programming languages
    9·1 answer
  • Illustrate the process of using an operating system to manipulate a computer’s desktop, files and disks.
    12·1 answer
  • Which answer best describes an unsubsidized federal loan
    9·1 answer
  • A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t
    10·1 answer
  • I love the brainly update guys! :)
    5·2 answers
  • 8.1.4: Ghost Invasion!
    10·1 answer
  • Which statement refers to a computer software
    9·1 answer
  • What is the "Driver's Compact Law"?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!