1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vova2212 [387]
3 years ago
11

IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally,

at every stage of system development. True or false?
Computers and Technology
1 answer:
elixir [45]3 years ago
3 0

Answer: True

Explanation:

System development is the process in which a system is developed,planned, designed,tested, modified etc. Analysis of design,internal structure and external factors is done for implementation to creation of system.

  • An IT professional is responsible for performing various tasks in system development.He/she has to analyze and detect that the developed system is convenient for user.
  • Involvement of user also plays an important part in system development through various ways such as improvement in system, smooth implementation,innovation,enhancing quality etc.
  • So, user can be involved in official or unofficial manner for betterment of system development.
  • Thus, the given statement is true.
You might be interested in
which server edition doesn't support any server roles that you would typically use with standard version
ioda

On the standard version of Microsoft Windows, Dynamic Host Configuration Protocol Server and Hyper-V Remote Access are two roles that aren't supported on Azure Virtual Machines - a type of server.

<h3>What is a Server?</h3>

It is to be noted that this is a computer device (hardware) or virtual environment (software) that feeds another computer with special services.

<h3>Type of Server</h3>

The following are various types of servers:

  • Webserver
  • Proxy Server
  • Virtual Machine (VM)
  • Database Server
  • Mail Server

See the link below for more about Servers:

brainly.com/question/25435769

8 0
3 years ago
Computers in a medical office should be protected by which of the following security tools?
Verizon [17]
<span> it is necessary to maintain your computer on a regular basis. .... Remember these key points when recommending the Internet to a patient

Hope it helps.
</span>
8 0
4 years ago
Read 2 more answers
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
gavmur [86]

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

4 0
3 years ago
_______medium is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated wi
KiRa [710]

Answer:

The answer is Magnetic

Explanation:

Magnetic medium is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnetically sensitive materials.

Magnetic based drives, for example:- Hard disk. Floppy Disk. Magnetic tape.

Optical based drives, for example:- CD drive (ROM and RW) DVD drive (RPM and RW)

Flash or solid state chip based drives, for example:- USB drive. SD cards.

7 0
3 years ago
Just giving this a shot, Which of the following statements about RAM are TRUE? Select all that apply.
tiny-mole [99]
I believe the answer is A and B

7 0
4 years ago
Other questions:
  • which of the following is not an operating system? A. leopard B. linux C. firefox D. windows
    11·2 answers
  • What does the acronym vsepr represent {spelling is important} question 1 options:?
    12·1 answer
  • Splunk uses ________ to categorize the type of data being indexed..
    11·2 answers
  • 3. Matthew captures traffic on his network and notices connections using ports 20, 22, 23, and 80. Which port normally hosts a p
    14·1 answer
  • Grid computing takes advantage of the available 75% of unused processing power of a computer and links thousands of individual c
    13·1 answer
  • Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3,
    10·1 answer
  • In this project you will write a set of instructions (algorithm). The two grids below have colored boxes in different
    9·2 answers
  • Based on the information in the table, which of the following tasks is likely to take the longest amount of time when scaled up
    14·1 answer
  • 1.
    8·1 answer
  • how does the use of data abstraction manage complexity in program code? how does using lists make a program easier to develop an
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!