1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
matrenka [14]
3 years ago
5

highlight the possible risks and problems that should be address during the implementation of information system process

Computers and Technology
1 answer:
Olenka [21]3 years ago
8 0

Answer:

The answer is below

Explanation:

The possible risks and problems that should be addressed during the implementation of the information system process are:

1. power loss or data corruption

2. System design faults

3. Cultural barriers

4. Integration of Software Development device

5. Using the same processes in the company

6. Security breaches

7. Hardware and Software failure

8. Work environment

You might be interested in
What command enables you to initialize quotas on a file system?
jeka57 [31]
 Quotas can be enabled by mounting a partition with the usrquota (and optionally the grpquota) mount option(s).Normally this is done by editing /etc/fstab and adding usrquota to the mount options part of the entry for some filesystem.Then that <span>filesystem must be remounted ("mount -o remount filesystem").</span>
4 0
3 years ago
Create a cell reference in a format by typing in the cell name or
Neko [114]

Answer:

D. Create a cell reference in a formula by typing in the cell name or clicking the cell.

Further Explanation:

To create a cell reference in a formula the following procedure is used:

First, click on the cell where you want to add formula.

After that, in the formula bar assign the equal (=) sign.

Now, you have two options to reference one or more cells. Select a cell or range of cells that you want to reference. You can color code the cell references and borders to make it easier to work with it. Here, you can expand the cell selection or corner of the border.

Again, now define the name by typing in the cell and press F3 key to select the paste name box.

Finally, create a reference in any formula by pressing Ctrl+Shift+Enter.

6 0
3 years ago
Write any three primary activities of a program??​
katrin2010 [14]

Answer:

Input, Processing, and Output

Explanation:

Hope it helps you..

Your welcome in advance..

(◍•ᴗ•◍)

4 0
3 years ago
A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
drek231 [11]

Answer:D)Format string attack

Explanation:

Format string attack is the type of attack that causes to change the application functioning .This attack access the memory of the string library. It occurs while the submission of the string as input and then gets tested due to application command.

Other options are incorrect because these are the attacks that don't happens in the application for the alteration of the flow. Thus, the correct option is option(D).

8 0
3 years ago
Please tell fast plzzzzzz.​
lana [24]

Answer:

True

Explanation:

4 0
3 years ago
Other questions:
  • 7. While an adjacency matrix is typically easier to code than an adjacency list, it is not always a better solution. Explain whe
    5·1 answer
  • 8. Understanding the proper classification of a problem or fault
    10·1 answer
  • Extended ACLs can filter traffic based on _____. (Points : 3) protocol type
    8·1 answer
  • PLZ HELPPPPPPPPPPPPPPPPPPPP
    9·1 answer
  • Write a Java program that will 1. Ask the user to type in a sentence, using a JOptionPane.showInputDialog(). 2. The program will
    10·1 answer
  • Write an algorithm that gets as input your current credit card balance, the total dollar amount of new purchases, and the total
    8·1 answer
  • Domestic refers to things that happen __________ of the united states
    15·2 answers
  • How should you best communicate<br> this information to Keisha?<br> (Select all that apply.)
    13·1 answer
  • A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web s
    13·1 answer
  • Describe how being a global citizen in the world of advanced technology can be beneficial to your success in meeting your person
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!