1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
matrenka [14]
3 years ago
5

highlight the possible risks and problems that should be address during the implementation of information system process

Computers and Technology
1 answer:
Olenka [21]3 years ago
8 0

Answer:

The answer is below

Explanation:

The possible risks and problems that should be addressed during the implementation of the information system process are:

1. power loss or data corruption

2. System design faults

3. Cultural barriers

4. Integration of Software Development device

5. Using the same processes in the company

6. Security breaches

7. Hardware and Software failure

8. Work environment

You might be interested in
Can someone please give me Python test 3 it would help me tremendously
Ket [755]

Question 1:  To tell what will happen when an if-statement is false.

Question 2: The = should be ==

                    elseif should be elif

                    The else should have a :

Question 3: All algorithms can only do number calculations.  

Question 4: and

Question 5: To make a follow-up True/ False decision

Question 6: if (text1 > 15):

Question 7: if (text1 == 78):

Question 8: if (num1 != num2):

Question 9: >=

Question 10: 4

Question 11: 3

Question 18: a < b and a != b  

Question 19: !=

Sorry about 12 - 17 and 20 i can't seem to find those questions guessing you wanted edhesive. I dont have an account on it.

5 0
3 years ago
A certain programming language uses 4-bit binary sequences to represent nonnegative integers. For example, the binary sequence 0
Delvig [45]

Answer:

C

Explanation:

An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15

5 0
4 years ago
What are some catchy names for computer basics that you would put on a childrens poster?
Triss [41]

Answer:

not sure

Explanation:

6 0
3 years ago
Which of the following emerging technologies uses the principle of chromosomes to identify suspects?
Slav-nsk [51]

Answer:

b

Explanation:

they say this on the quiz but because of the irrationality DNA has

4 0
3 years ago
Dust buildup inside a desktop PC case can be managed effectively by ____.
antoniya [11.8K]
Frequent cleaning with an air duster can would do the job
6 0
3 years ago
Read 2 more answers
Other questions:
  • Identify which portion of the below host IP addresses are invalid and explain why it is invalid. Hint: If you aren't sure, conve
    12·1 answer
  • True or false: although the first personal computers were available as early as the 1970's, the creation of the world wide web (
    11·1 answer
  • Alice is adding a chart in a spreadsheet. Which option will allow you her to give the chart a suitable title and subtitle?
    11·2 answers
  • PLEASE help me RIGHT NOW!!!!!!!!! I will give a Brainly to anyone who helps me!
    15·1 answer
  • A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting th
    15·1 answer
  • I have a question involving do and for loops while using arrays.
    8·1 answer
  • In step 4 of the CSMA/CA protocol, a station that successfully transmits a frame begins the protocol to transmit a second frame
    9·1 answer
  • Which area of study involves microeconomWhich area of study involves microeconomics? A. a nation's ability to meet consumer dema
    10·1 answer
  • Color.
    9·1 answer
  • What's the use of computer?Where are they used?​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!