Answer:
Examples of Fact-finding techniques includes:
-
Prototyping
-
Questionnaires
- Research and sites visit
-
Interviews
Explanation:
It is important to note that a database system is a tool that allows users to define, create, maintain, and control access to a collection of logically related data and description of these data, designed to meet the information needs of an organization.
<u>Prototyping
</u>
<em>Advantage:</em> enables testing and understanding of the system in advance before final implementation of solution, while requiring less time for research.
<em>Disadvantage:</em> Training and Development cost consumes resources.
<u>Research and site visit </u>
<em>Advantage :</em> better time management if the problem has been researched upon before.
<em>Disadvantage:</em> appropriate permission is often needed before using research materials.
<u> Questionnaires
</u>
<em>Advantage: </em>This technique is not expensive, and responses can be calculated and analysed quickly.
<em>Disadvantage:</em> There may be Incomplete answers received from users and body language of user cannot be observed.
<u>Interviews</u>
<em>Advantage:</em> The body language of interviewees is been perceived.
<em>
Disadvantage: </em>Interviewing is time consuming and costly.
Answer:
Computer ports are classified into two types based on the protocols used. A protocol is a set of rules and standards to be followed during data transfer and communication. Usually, data is transmitted in a particular pattern.
Explanation:
1. Acts of human error
<u>Explanation:</u>
Insecurity their are many threats that make a desktop or workstation or laptop. Normally end users have to update operating systems and virus signature updates by periodic scheduling task moreover to avoid threats end-user also have to do periodic scheduling scanning. And the virus cleaning. Download the third-party malware and spyware and then the cleaning process.
End-users have made sure all required service is activated and running in the organization.
The team has to make sure any software threats are found in PC or workstation or laptop or desktop or LAN and try to remove make system up running without any threats.
Answer:
A good design brief often begins with some information about the client and what their brand stands for. Including this helps to connect an individual project with the bigger picture. Aim to capture key points about what the company does, how big they are, and what their key products or services are.
Explanation:
A good design brief often begins with some information about the client and what their brand stands for. Including this helps to connect an individual project with the bigger picture. Aim to capture key points about what the company does, how big they are, and what their key products or services are.