1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
matrenka [14]
3 years ago
5

highlight the possible risks and problems that should be address during the implementation of information system process

Computers and Technology
1 answer:
Olenka [21]3 years ago
8 0

Answer:

The answer is below

Explanation:

The possible risks and problems that should be addressed during the implementation of the information system process are:

1. power loss or data corruption

2. System design faults

3. Cultural barriers

4. Integration of Software Development device

5. Using the same processes in the company

6. Security breaches

7. Hardware and Software failure

8. Work environment

You might be interested in
The following function takes an array of n integers as its input and returns 1 if the array is sorted in non-decreasing order, 0
SIZIF [17.4K]

Answer:

Following is given the detailed solution to each part o question. I hope it will help you a lot!

Explanation:

5 0
3 years ago
Write one line Linux command that performs the required action in each of the problems given below: (a) Find the difference in t
Luda [366]
You have to add the integer
8 0
3 years ago
The filter feature in excel allows you to look at what Data?
madam [21]

For applying the filter you need to select the data on which you want to apply it so it will allow you to look at only data you select from the filter options.

4 0
3 years ago
Which of the following is CORRECT about database managementsystem's languages?
scZoUnD [109]

Answer:

Data manipulation languages are used for the retrieval of the,insertion,deletion and modification of data.

Explanation:

Data Manipulation Languages(DML) are used to insert,delete,update,modify the data in the database.

The commands used to do these operations are as following:-

INSERT INTO :-This command is used to insert values in the database.

DELETE:-It is used to delete existing records from the table.

UPDATE:- It is used to modify the records in the table.

SELECT:- It is used to select data from database.

3 0
3 years ago
The physical parts or components of a computer system is called .
dmitriy555 [2]
Answer:
Motherboard

Explanation:
Motherboard is the main component of a computer. It connects with other parts of the computer including drive disks, RAM and CPU and any other expansion slots :)

(Hope it helped)
4 0
3 years ago
Other questions:
  • ________ are devices used to send data between two networks.
    11·1 answer
  • I NEED HELP NOW PLEASE!!!!!!
    6·2 answers
  • Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network serv
    5·1 answer
  • PLEASE PLEASE PLEASE PLEASE PLEASE HELP! I'M BEGGING Y'ALL! I NEED THIS FOR TODAY! CORRECT ANSWERS WILL BE AWARDED BRAINLIEST!
    6·1 answer
  • There are _______ bits to every byte.
    14·2 answers
  • You are given the task of reading in n numbers and then printing them out in sorted order. Suppose you have access to a balanced
    12·1 answer
  • Vegetable farming is a good source of income explain this statement<br>​
    5·1 answer
  • 8.6 Code Practice: Question 2
    7·1 answer
  • How many residues separate amino acids that are stabilized by hydrogen bonds in α helices?.
    12·1 answer
  • This method of file transfer has been used for decades and is frequently used for uploading changes to a website hosted by an in
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!