1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
3 years ago
8

Assume you are part of the systems development team at a medium-sized organization. The database will enable sales reps to have

more control over their customer information including up to date information on purchases, backorders, returns, and invoices. As a result of the system the company will be able to assign accounts to sales reps based on their expertise, the proximity to their other accounts, and experience level in the company. Commissions will also vary based on the types of products and services sold and the reps will be able to see special promotional programs in their regions. Part 1: you have just completed the database design portion of the systems design phase, and the project sponsor would like a status update. Assuming the project sponsor is a VP in the marketing department, with only a high-level understanding of technical subjects, how would you go about presenting the database design you have just completed? Part 2: how would your presentation approach change if the project sponsor were the manager of the database team?
Computers and Technology
1 answer:
Ivan3 years ago
6 0
This is my answer


2. Presenting to a non-technical manager should be much more high-level, with few if any technical details. The focus should be on how the database design will benefit the business (for example, with faster report generation). Presenting to a technical manager would be focused much more on the technical aspects of the database, with less of a focus on the business benefits of the design.
You might be interested in
The Solution Explorer window ____.
nataly862011 [7]

Answer:

The correct answer for the given question is option(d).

Explanation:

Solution Explorer is found in Microsoft Visual Studio.When we create a project in the c# or another programming language the solution explorer window is used. The Solution Explorer takes care of the projects and files.  

Solution Explorer displays an overall view of the current project. In the Solution Explorer we can delete or add the file in the project. The  Solution Explorer window displays the list that is contained in the current solution.

  • Option(a),Option(b) and Option(c) are the incorrect option for the Solution Explorer window.
  • So, Option(d) is the correct answer for the solution explorer.
8 0
3 years ago
Attackers need a certain amount of information before launching their attack. One common place to find information is to go thro
VARVARA [1.3K]

Answer:

The answer is Letter D. Dumpster diving.

Explanation:

This process of going through a target's trash is known in the community as dumpster diving. This attack is a technique used to retrieve information that could be used to carry out an attack on a computer network.

It is important to inform that the dumpster diving it is not limited to searching through  the trash for obvious treasures like acess codes or passwords written down on sticky notes.

8 0
3 years ago
What are the limits of hashing and verifying that files haven’t changed?
earnstyle [38]

The hashing function can take any number of key-value pairs and there is no specific limit to it.

<h3>What is hashing?</h3>

Hashing is a file-based algorithm for producing a fixed-length bit string value. A file is essentially a collection of data blocks. The length of the data is reduced by hashing to a fixed number or key that represents the original string.

When hashing is employed, the hash function may plot all of the keys and values to what the real size of the table is, demonstrating that the hashing function can take any number of key-value pairs with no restriction.

However, if the passwords are hashed in encryption, recovering the passwords is extremely difficult.

Thus, the hashing function can take any number of key-value pairs and there is no specific limit to it.

Learn more about the hashing here:

brainly.com/question/13106914

#SPJ1

5 0
2 years ago
Examples of sound effects that can be used in video games and a cartoon
astraxan [27]
BOOM!, KAPOWW!, X%[email protected]*?!, SLAP, BOING, DING, ZZZZ, etc.
8 0
3 years ago
Copyrighted software illegally downloaded and sold by organized groups without a license to do so is called:
trasher [3.6K]
Copyrighted software illegally downloaded and sold by organized groups without a license is called Warez
5 0
3 years ago
Other questions:
  • 1. A device that can be used to insert data into a computer or other computational devices is
    6·2 answers
  • Potatocat2UwU da best
    12·1 answer
  • In cell G6, use the appropriate lookup and reference function to retrieve the rental rate from the named range RentalRates. The
    15·1 answer
  • Which are factors that go into a project plan?
    8·1 answer
  • Varun wants to start his own business. Suggest him at least four functions of an entrepreneur.
    8·2 answers
  • State all the generations of computers.
    10·2 answers
  • Select the correct answer.
    12·2 answers
  • What is the difference between mutex lock and race condition​
    6·1 answer
  • Does anyone have Rblx? if so write your username
    6·1 answer
  • Can someone write this in java? Also, does anyone know how to do Edhesive assignments?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!