1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nasty-shy [4]
3 years ago
14

Which installation changes from the old information system to the new one incrementally, starting with one or a few functional c

omponents and then gradually extends the installation to cover the whole new system?
Computers and Technology
1 answer:
Wewaii [24]3 years ago
5 0

Answer:

Phased installation

Explanation:

The name of this strategy is phased installation. Phased installation (or phased implementation) occurs when an existing system is replaced by a new one. However, unlike most implementations, this takes place in stages. This has several advantages. First, it allows you to test the system. If there is a problem with it, it is easier to revert back to the old strategy. Moreover, if employees need to adopt this new system, it allows them to get used to it slowly while still being able to access the previous one.

You might be interested in
One of the disadvantages of cable technology is that: while it works well for television signals, it is ineffective for data tra
nignag [31]

Answer:

systems used by many providers require customers to share bandwidth with neighbors

Explanation:

One of the disadvantages of cable technology is that systems used by many providers require customers to share bandwidth with neighbors. This ultimately causes many problems since cables would need to be extended to reach every single user that will be sharing the bandwidth. This would mean cables all over the place. Also, it is very difficult to limit the bandwidth per person, meaning that if anyone is using up all of the bandwidth through the cable, the rest of the individuals connected would not have the bandwidth that they need or are paying for.

7 0
3 years ago
What is imagined risk
lara31 [8.8K]
Hello there!

Imagined Risks are simply 'imaginary' risks that are created out of doubt/fear.

Hope This Helps You!
Good Luck :)
3 0
4 years ago
When you enable user access control (uac)
SVEN [57.7K]
The UAC is on by default. So, you don't need to turn it on unless someone else turned it off.

The UAC has four modes.

The lowest mode is the off position. If the UAC is off, no UAC prompt will pop up when doing administrative tasks.

6 0
3 years ago
Suppose you have a string matching algorithm that can take in (linear)strings S and T and determine if S is a substring (contigu
Zielflug [23.3K]

Answer:

no seishsssssssssssssssssssss

8 0
3 years ago
Read 2 more answers
Felicity wants to capture the attention of the regular subway commuters in her area though her print advertisements​
mel-nik [20]

Answer: billboard

Explanation:

Plato answer

8 0
3 years ago
Other questions:
  • What term refers to a piece of software that interfaces with the hardware on your computer?
    10·2 answers
  • What additive keeps engines clean by preventing contaminates and deposits from collecting on surfaces? a. Friction modifiers b.
    10·2 answers
  • Plane eyes I don't know
    9·1 answer
  • Write the percentage 5 1/4 as a decimal​
    8·1 answer
  • What is the role of the federal government in regulating the media and the internet?
    6·2 answers
  • Please debug the below code in Java please.
    15·1 answer
  • If you do not use the mini toolbar, it remains on the screen. _______________​ Group of answer choices True False
    8·1 answer
  • Write a program to accept 10 different whole number from the user and store them in a
    11·1 answer
  • What is the school wifi password trying to do my class work in school on different devices.
    9·1 answer
  • 40 points
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!