1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
4 years ago
6

In the context of the planning phase of the systems development life cycle (SDLC), which is an example of an internally identifi

ed problem in information systems? a. Distributers demanding an increase in their profit margin before the launch of the system b. Government regulations that need to be followed by the system for its approval in the global marketplace c. Suppliers noting inefficiency in the inventory control procedure d. Management voicing concern about the organization’s lack of a competitive edge in the marketplace
Computers and Technology
1 answer:
erma4kov [3.2K]4 years ago
8 0

Answer:

The correct option to the following question is D.).

Explanation:

SDLC stands for the System Development Life Cycle.

The aim of the SDLC is to produce the high quality of the software that exceeds or meets the reaches completions and customers' expectations with costs and time expectations.

Software Development Life Cycle is the frameworks that defining the task performed at each of the steps in software development process.

You might be interested in
What does Boot Partition mean?
lukranit [14]

Answer:The system partition and the boot partition are computing terms for disk partitions of a hard disk drive or solid-state drive that must exist and be properly configured for a computer to operate. There are two different definitions for these terms: the common definition and the Microsoft definition. - Wikipedia.

Explanation:

8 0
4 years ago
What does aiff stand for?
trapecia [35]
Audio Interchange File Format
6 0
3 years ago
Read 2 more answers
You have been hired to upgrade a network of 50 computers currently connected to 10 mbps hubs. this long-overdue upgrade is neces
Nonamiya [84]

It is suggested to use a wireless router and switches for the network. As there are only 50 computers, you can opt for a router and two 24-port network switches. The server and one computer can be connected to the router directly.

The other computers can be connected to the switches.

* If you have a broadband connection, connect your cable modem to the router using the Ethernet cable.

Place these two network devices in the location which can be accessed easily because all the workstations have to be connected to this point with the network cable.

or

If you would like to connect to the network wirelessly, the router should be in a center point so that all the workstations get a strong signal.

* If you are using a wired connection, conect the network switch into the open Ethernet ports on back of the router. This will give you additional ports.

* Now, run ethernet cables from each workstaion to the switch. From there, connect you wireless network to make sure that you get an internet connection.

If it is wired conection, ensure that you set the IP address in each workstation with the server setting.To do so:

Click Start ->Run or hold Windows+R,

Type ncpa.cpl

Control Panel window would appear.  

Click Network and Sharing Center.

Click Change adapter settings.

Click on the connection and click Properties.

Click Internet Protocol Version 4(TCP/IPv4)Properties.

You can either select --Obtain IP address automatically(where IP addresses are automatically assigned for each workstation)and select

Obtain DNS server address automatically.

or  

Select Use the following IP address (In this case, the IP and DNS information is provided by the Internet Service provider).

This would setup a network.

Please check the manual provided with the router to configure the router.

It is also suggested to ensure that you setup security for your router.

The reason for using routers as the main device is because routers are the smartest. Routers perform two important tasks:

DHCP and NAT

DHCP-Dynamic Host Configuration Protocol is the way dynamic IP addresses are assigned.

NAT- Network Address Translation is the way router translates IP addresses of packets across the Internet or the local boundary.

When switches are considered, it can be managed or unmanaged switches.Switches provide a more structured network.An managed switch can be accessed onsite or remotely and can be programmed by the manager.16 port managed switches are available from CISCO and Dell. An unmanaged switch can be used for home or smaller networks where 24-port switches can be used.

Each system would be individually connected to the network switch in the network, so that even if a single system fails, there would be no breakdown in the network.

8 0
3 years ago
Consider the following relation for published books: BOOK (Book_title, Authorname, Book_type, Listprice, Author_affil, Publisher
Ivenika [448]

The key for this relation is Book_title,Authorname. This relation is in 1NF and not in 2NF as no attributes are FFD on the key. It is also not in 3NF

<u>Explanation:</u>

<u> lGiven the relation </u>

<u>l</u>Book(Book_title, Authorname, Book_type, Listprice, Author_affil, Publisher)

land the FDs

lBook_title . Publisher, Book_type

lBook_type . Listprice

lAuthorname .Author_affil

(a) The key for this relation is Book_title,Authorname. This relation is in 1NF and not in 2NF as no attributes are FFD on the key. It is also not in 3NF

(b) 2NF decomposition:

lBook0(Book_title, Authorname)

lBook1(Book_title, Publisher, Book_type, Listprice)

lBook2(Authorname, Author_affil)

<u> This decomposition eliminates the partial dependencies. </u>

3NF decomposition:

lBook0(Book_title, Authorname)

lBook1-1(Book_title, Publisher, Book_type)

lBook1-2(Book_type, Listprice)

lBook2(Authorname, Author_affil)

l<u>This decomposition eliminates the transitive dependency of Listprice </u>

8 0
3 years ago
In the context of a global information system (gis), _____ offer electronic data interchange standards, encryption, secure e-mai
11Alexandr11 [23.1K]
Answer is (B) Value-added networks.

A van is a private network provider hired among online companies that facilitate EDI (Electronic Data Interchange) or other network services such as message encryption, securing mail, and management reporting. A Value Added Network provides an easy way for ecommerce businesses to share data and communicate securely.






8 0
4 years ago
Other questions:
  • Create and test an HTML document that describes nested ordered lists of cars. The outer list must have three entries: compact, m
    7·1 answer
  • How to tell if screen or screen protector is cracked?
    5·2 answers
  • Is cloud computing a hardware service used to keep computers working? True or False
    11·1 answer
  • Computer recycling, electronic recycling or e-waste recycling is the disassembly and Most electronic waste is sent to landfills
    6·1 answer
  • A(n) _________ is a formal access control methodology used to assign a level of confidentiality to an information asset and thus
    6·1 answer
  • Identify the normalized form of the mantissa in 111.01.
    14·1 answer
  • 100 tickets are sold in a raffle with one prize. John has 8 tickets, Jamie has 10 tickets, find the probability that John wins
    11·2 answers
  • Authentication is a mechanism whereby unverified entities or supplicants who seek access to a resource provide a label by which
    12·1 answer
  • PLEASE HELP! Please dont answer if your going to guess
    14·2 answers
  • And this also please. help​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!