1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonja [21]
3 years ago
5

The study of a current business and information system application and the definition of user requirements and priorities for a

new or improved information system are part of which phase? (Points : 2) Problem analysis phase
Scope definition phase
Requirements analysis phase
Decision analysis phase
None of the above
Computers and Technology
1 answer:
torisob [31]3 years ago
5 0

Answer: Problem analysis phase

Explanation: Problem phase analysis is the mechanism that helps in studying the problems and issue that occur in the application and system of any business organization.It helps in identification of the reason and consequences of the detected problems.The requirements of user and resources to accomplish business system is also analyzed.

Other options are incorrect because scope definition phase is used for identification of the boundaries of any project regarding opportunities and issue in business .

Requirement analysis phase is used for gathering the need of the user and the condition requirement to fulfill a project. Decision phase analysis is done to bring out the best possible solution for any project. Thus, the correct option is problem analysis phase.

You might be interested in
Identify a true statement about decision support systems (DSSs).
Zolol [24]

Answer:

a. facilitate improvements but do not necessarily cause them.

Explanation:

Decision Support Systems are interactive Information systems that assist  decision makers in coming up with strategies that help the organisation achieve its goals .The model base of the DSS uses mathematical and statistical models to analyse information then it generates reports and suggest possible solutions that can be implemented .The system is capable of giving a specific solution and some even allow the decision makers to give input before suggesting the most applicable solution.The effectiveness of a DSS is equally as important as its efficiency .The DSS unlike the conventional decision-making process should be able to analyse information effectively and come up with solutions in the shortest possible time frame.

7 0
4 years ago
The______for our newest game keeps changing as we develop our concept and refine our goals.
antiseptic1488 [7]
I think d is the best here
6 0
3 years ago
Read 2 more answers
"Save" or "save as" can be used interchangeably and have no unique features.<br> True<br> False
zimovet [89]

Answer:

False.

Explanation:

"save" just preserves any edits made to file in its current state. "Save As" lets you rename it and change the file type.

4 0
3 years ago
Read 2 more answers
__________ refers to excavating the sides of an excavation to form one or a series of horizontal levels or steps, usually with v
Nutka1998 [239]

The answer is Benching.

Benching and sloping are methods used to protect employees working in excavations from cave–ins. Benches are cuts in the slope that provides protection by removing material at an angle to its floor. They give the slope a stair-step appearance with emphasis on the angles; the flatter the angle, the more the protection. Benches are split into two groups: simple and multiple.

6 0
3 years ago
Read 2 more answers
how many usable host addresses are available for each subnet when 4 bits are borrowed from a class C IP address
jonny [76]

Answer:

The answer is "14".

Explanation:

Let the IP address = 196.45.204.0

When it borrowed 4 bits

\therefore\\\\ subnet = 28

IP=  \frac{196.45.204.0}{28}\\\\ 28 \to 11111111.11111111.11111111.11110000

If the borrowed bits are left out then:

The Number of useable host addresses:

= {(2^4) - 2} \\\\ = 16-2\\\\ =14

3 0
3 years ago
Other questions:
  • What are the two most important network-layer functions in a datagram network? what are the three most important network-layer f
    7·1 answer
  • What is Processor to Memory Mismatch problem?
    15·1 answer
  • List two items that are required to make a text file into a bash script.
    15·1 answer
  • The sample remote access policy document from the hospital that you reviewed in the lab showed that the Remote Access Domain is
    15·2 answers
  • Which option is an example of a Boolean operator?<br> O A. HTML<br> O B. <br> C. SEO<br> D. NOT
    5·1 answer
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    12·1 answer
  • What is the difference between "What I ought to do?" and "What kind of person should I be"?
    12·1 answer
  • graphic designers can compress files in different formats . One of the formats ensures that the quality and details of the image
    7·1 answer
  • Wht is these things Aᔑ bʖ cᓵ d↸ eᒷ f⎓ g⊣ h⍑ i╎
    15·2 answers
  • A variable is assigned a value on line 328 of a program. Which of the following must be true in order for the variable to work?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!