1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
3 years ago
12

What should not be compromised when trying to meet standards and deadlines?

Computers and Technology
1 answer:
n200080 [17]3 years ago
5 0
A i believe is the answer
You might be interested in
Briefly define each components of information systems (hardware, software, data, networking, people and procedure). While you ar
WARRIOR [948]

Answer:

1. Hardware is the physical components that compose a system and provide physical quantity and quality to software applications and accomplish information processing tasks

2. Software is a program that carries out a set of instructions written in a programming language. It instructs a computer on how to carry out specific tasks. Programs can be saved permanently or temporarily.

3. Data may be mostly the raw resources used by information systems experts to give business intelligence to users. Traditional alphanumeric data, which is made up of numbers and alphabetical and other characters, is one type of data.

4. Networking is a resource of any computer system connected to other systems via a communications. It refers to the physical connections between all of the network's nodes. Communication networks are a critical resource component of all information systems, according to networking.

5. People are those who are directly or indirectly involved in the system. Direct users include developers, programmers, designers, and system administrators. Direct users can also be the stakeholder or end user who receives an output from the system. Indirect can be a manager who takes a brief check at the system to check that all criteria are satisfied.

6. Procedure is made up of stages or phases that result in an output. A method of continually receiving feedback on each part while analyzing the overall system by observing various inputs being processed or altered to create outputs.

7 0
2 years ago
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames
aksik [14]

Answer: (B) An insider

Explanation:

 According to the question, an Angela is an insider as she maintain all the sensitive and confidential information of the customer like the password, username,SSN (Social security number) and the personal information.

Angela and her co-worker has the right for using the customer sensitive information and data. An insider is the person who keeps all the sensitive information of the organization or company.

5 0
3 years ago
How is abstraction used in a GPS system
ipn [44]
The designs on the map of the GPS system Im would think but can you be more specific?
8 0
4 years ago
Read 2 more answers
Which of the following questions will most likely be answered by displaying data on a line graph?
Artemon [7]
I'm pretty sure the answer is b
4 0
3 years ago
The tcp/ip ____ layer commonly uses the transmission control protocol (tcp) to maintain an error-free end-to-end connection.
aleksklad [387]
The answer would be the TCP/IP Application Layer.
6 0
3 years ago
Other questions:
  • Whereas lines of competition are clearly defined in the more established industries, in the Internet industry they are blurred a
    9·1 answer
  • How many generations of computer languages have there been since the middle of the 20th century?
    9·2 answers
  • White meat and dark meat fish have slightly different nutritional characteristics. What are the nutrition characteristics of dar
    7·2 answers
  • On other questions, how do I write my own question, without commenting on others questions? It is only allowed two, I think, the
    13·1 answer
  • Assume that input file references a Scanner object that was used to open a file. Which of the following while loops shows the co
    6·1 answer
  • Write a function in Java that implements the following logic: Given a string and an int n, return a string made of n repetitions
    15·1 answer
  • Jody should select the
    5·1 answer
  • **NEED HELP??!! Computer Science Questions!! KNOWING GIMP!!!!
    7·1 answer
  • A _______ is one typed character.<br> -gigabyte<br> -byte<br> -megabyte<br> -kilobyte<br> -terabyte
    7·1 answer
  • Write a function DrivingCost with input parameters drivenMiles, milesPerGallon, and dollarsPerGallon, that returns the dollar co
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!