1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
4 years ago
9

What are the possible consequences if you fail to identify system requirements correctly and completely?

Computers and Technology
1 answer:
AlladinOne [14]4 years ago
4 0
There are a few consequences for failing to identify system requirements. 

1. Strain on time and effort which can cost money for either a company or yourself (depending if you are an employer, employee, etc).

2. Additional costs for hardware. If you decide to upgrade your hardware on a later time. It will cost additional money for repairs and replacements to adjust.

3. It can cause dissatisfaction to a user if you are working as a technician (for example) which can leave a negative mark on your reputation/resume) 
You might be interested in
When using a search engine, what is the name of a word or phrase somebody types to find something online?
KIM [24]

Answer:

Option C:  Search query

Explanation:

A search query is the text input given by the user when finding something online. The text input can be a word or phrase.

For example, a simple word search query can be Biology.

A more complicated search query can consist of phrases like Who is the highest Paid NBA Player

The search engine will return the corresponding web pages where the relevant answers or information can be found.

8 0
4 years ago
Read 2 more answers
Which activity constitutes legal computer activity?
Sveta_85 [38]
c.

b\c it's copy write so you can download that but not a. b. or d.
3 0
3 years ago
The user can set their own computer hostname and username. Which stage of the hardware lifecycle does this scenario belong to?
11111nata11111 [884]

Answer:

Deployment

Explanation:

Hardware lifecycle management is geared at making optimum use of the computer hardware so as to maximize all the possible benefits. During the deployment stage of the hardware lifecycle, the user is prompted by the computer to input their own computer hostname and username. In doing this, it is important that the user takes note of possible flaws in security. Passwords are set at this stage too. The four stages in the hardware lifecycle are procurement, deployment, maintenance, and retirement. At the deployment stage, the hardware is set up and allocated to employees so that they can discharge their duties effectively.

So, for organizations, it is important that strong passwords are used to prevent security breaches in the event that an employee leaves the organization.

8 0
3 years ago
Microsoft Word is ________________ software.
s2008m [1.1K]

Answer:

Application

Explanation:

Word is used to change things and make things

4 0
3 years ago
Can someone help me please ??
zavuch27 [327]

Answer:

x=27-the value of 0.1 x all sides

Explanation:

subscribe to me at chrisgot ha x

6 0
3 years ago
Other questions:
  • What are some ways social media networks make money from users
    10·1 answer
  • .In Linux what command sequence do we enter to stop a program?
    11·1 answer
  • To increase the view of a document on the screen, use the _____. View icon Zoom slider full-screen reading boldface font
    9·1 answer
  • Create an application that writes a series of random numbers to a file. Each random number should be in the range of 1 through 1
    9·1 answer
  • Write a program that takes a three digit number (input) and prints its ones, tens and hundreds digits on separate lines
    14·1 answer
  • Someone places a chocolate bar near a working radar set that is used to locate ships and airplanes. Which best describes what is
    15·2 answers
  • Viruses and worms can affect a system by:
    11·2 answers
  • A tornado destroyed many
    6·2 answers
  • Which is an advantage of using a flat file instead of a relational database?
    5·1 answer
  • Who is katie and why is she deleting my answers
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!