1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
matrenka [14]
3 years ago
5

highlight the possible risks and problems that should be address during the implementation of information system process

Computers and Technology
1 answer:
Olenka [21]3 years ago
8 0

Answer:

The answer is below

Explanation:

The possible risks and problems that should be addressed during the implementation of the information system process are:

1. power loss or data corruption

2. System design faults

3. Cultural barriers

4. Integration of Software Development device

5. Using the same processes in the company

6. Security breaches

7. Hardware and Software failure

8. Work environment

You might be interested in
You are a very small company that sells healthcare insurance plans. You estimate that the breach of your customer database will
lozanna [386]

Answer:

C. Accept the risk

Explanation:

The first option is close but might not be suitable for a small company considering it's cost.

The second option which is to spend fifty thousand dollars per year on a data loss prevention solution is projected to cost you more than the risk.

The third option isn't specific and lacks a course of action.

6 0
3 years ago
Will a debit card still work if i put stickers on it?
laiz [17]

Answer:

Explanation:

Yes, it may still be readable, but if they refuse to take it you have no ground to stand on. (If you obscure the signature, at least make sure the CVV is readable or reprinted on top.) The plastic covering should not interfere with the mag stripe.

8 0
3 years ago
Read 2 more answers
From which tab can you format individual cell data like any other text? A.Design B. Home C. Table Tools Design D.Table Tools Lay
skelet666 [1.2K]
The answer to this question is the letter "B" which is the HOME tab. When you click the home tab, you can find the different number format in such a way that you can also format the individual cell, it could be data of any other text.
6 0
3 years ago
True or false: Information security primarily relies on technical approaches such as multifactor authentication or data encrypti
Brilliant_brown [7]

TRUE, that is a one-sided answer. One of the biggest examples is virtually unhackable blockchains.

8 0
3 years ago
Use the commands you've learned so far to draw a
Murrr4er [49]

The app you shown in the picture is that app scracth?

8 0
3 years ago
Other questions:
  • Who is typically considered to be the father of computing
    6·1 answer
  • Sequentially prenumbered forms are an example of a(n): a. Processing control. b. Data transmission control. c. Input control. d.
    10·1 answer
  • Given that the variables x and y have already been declared and assigned values, write an expression that evaluates to true if x
    15·1 answer
  • The space force enhancement function concerned with providing data on meteorological, oceanographic, and space environmental fac
    12·1 answer
  • What is wrong with line 1?
    14·1 answer
  • A ________ is a member function that is automatically called when a class object is
    6·1 answer
  • Which computer was part of the first generation of computers?
    14·2 answers
  • WILL MARK BRAINLIEST!!!!!!!!!!!
    6·2 answers
  • If Anime Characters were real , Who Would Your Anime Wife Would Be (Tell Who And Why)
    10·1 answer
  • Outside of a C program, a file is identified by its ________while inside a C program, a file is identified by a(n) ________. fil
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!