1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ziro4ka [17]
4 years ago
5

what key aspects did you learn regarding the creation, analysis, and management of information systems? How will this impact you

r future? What thoughts or issues were developed that require further exploration?
Computers and Technology
1 answer:
Lady_Fox [76]4 years ago
7 0

Answer:

Explanation:

What key aspects did you learn regarding the creation, analysis and management of information systems?

First of all, that there are several methodologies to develop an information system, each of them have their own steps to follow and it is really important to do echa one corretly because all the process is important.

Another important aspect is that once the information system is created, it is very important to keep maintaining it, check it regularly, this is for a goo management of it.

How will this impact ypur future?

Information systems nowadays are very common, for every aspect of our lives you can develop ahelpful one, this is how it will impact my future.

What thoughts or issues were developed that require further exploration?

Several questions must be investigated and answered once the system is working, such as...

Was the data the correct one? (correct methodology)

Is the system really having an impact?

Does it fill the time-quality-cost triangle aspect?

You might be interested in
Identify disadvantages that web designers encountered when using tables for page layout. Check all of the boxes that apply.
11Alexandr11 [23.1K]

Answer:

A and C

Explanation:

I got the question correct on Edge.

7 0
3 years ago
Read 2 more answers
Which of the following terms best describes the security domain that relates to how data is classified and valued?
d1i1m1o1n [39]

Answer:

c) Access Control.

Explanation:

The term which describes the security domain best that relates to  how the data is valued and classified is Access Control.

Access Control :It is the restriction of access of a resource or a place that is selective.Permission to access a resource is called authorization.It is an important term in the field of information security and physical security.

7 0
3 years ago
Why do organizations create multiple databases?
igomit [66]
Just in case one database gets hacked or crashes they have another to run on
5 0
4 years ago
Enter an input statement using the input function at the shell prompt. When the prompt asks you for input, enter a number. Then,
Pavel [41]

Answer:

<u>Explanation:</u>

An input statement using the input function at the shell prompt is as follows:

If a prompt asks for a input, a number is to be added

num = input ('Number: ')

num = num + 1

print(num)

Explanation of results: This gives error at line num= num + 1 as cannot convert int object to str implicitly

8 0
3 years ago
______ is a collection of instructions and commands used to define and describe data and relationships in a specific database.
hammer [34]
Data definition language (DDL) <span>is a collection of instructions and commands used to define and describe data and relationships in a specific database. DDL is </span>a subset of SQL statements that change the structure of the database : by creating objects, deleting objects, or modifying  objects, where objects can be  databases, tables, and views.
7 0
3 years ago
Other questions:
  • Match the risk mitigation techniques with their characteristics.
    11·1 answer
  • What can be designed to create annoying glitches or destoey data?...
    13·2 answers
  • Write a function get_initials(the name) that takes a string of a name and returns the initials of the name, in upper case, separ
    12·1 answer
  • Why is Brainly always deleting either my answers or my questions? I am putting nothing inappropriate in them. Can someone answer
    7·2 answers
  • The Start menu on Windows computers changes based on actions performed by their users. True False
    15·2 answers
  • What is call by reference in function of c​
    13·1 answer
  • escribe and explain at least three improvements you think came about with the introduction of intrusion prevention technology. J
    10·1 answer
  • 1. The first popular animated feature film was 1937’s Snow White and the Seven Dwarfs. (1 point)
    8·1 answer
  • Explain default dictionary in microsoft word​
    9·1 answer
  • A sample member of the list data is a1 = ['male', True] where the second item is True if the person is on the phone.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!