1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faltersainse [42]
3 years ago
10

Provide a status report to your classmates and instructor. Describe any modifications that you have made to the design or docume

ntation, discuss whether you encountered any new challenges or risks, and describe the mitigation strategy you implemented for addressing each risk. Are you meeting the objectives identified in your system proposal?What hardware, software, virtual desktop resources, and so on will you need to design and implement your system?What adjustments have you made to your document based on peer feedback?How do system components and applications interface and share data?In response to your peers, provide constructive feedback on their system design document progress and suggestions that they can incorporate into their documentation or projects. Is a sufficient amount of detailed information being provided to enable implementation by any skilled IT practitioner? Do you see any potential obstacles that they might come up against? If so, what approach can they take to overcome these challenges?When preparing your status reports, be sure that they are clear and well written. Engage your classmates in discussions that mimic the team dynamics expected in professional, real-world information technology project environments.Refer to the Discussion Rubric for directions on completing these discussions.
Computers and Technology
1 answer:
Pavel [41]3 years ago
3 0

Answer:

that's muddled up I can't make out the question

You might be interested in
Harry wants to change the background of all of his presentation slides. Which slide will enable him to make this change to all t
Mamont248 [21]

Answer:

The answer to the following blank is Theme.

Explanation:

To change themes in powerpoint:

  1. Firstly, click on DESIGN tab then, click in the Themes group.
  2. Then, choose one of the following themes.
  3. Then, under Custom, choose the custom theme to apply.
  4. Then, under Office, click the built-in themes and apply. If users goal is display the little to no color in the user's presentations then, apply the Office Theme.  
  5. After all, click the Browse for Themes, and then locate and then click the theme.
5 0
3 years ago
NoSQL is a programming language used to create mobile apps.<br> a) True<br> b) False
finlep [7]

Answer:

False

Explanation:

7 0
3 years ago
Read 2 more answers
What are the three fundamental elements of an effective security program for information systems?
marishachu [46]
<span>the three fundamental elements of an effective security program for information systems are Identification, Authentication and Authorization.The access control creates the user and assigns the rights to resources and authorization is giving permissions to the users to access the resources.The user who wants to enter the system should have a valid data t enter the system like password, fingerprint or any other type of recognition.</span>
4 0
3 years ago
Read 2 more answers
What will be a fundamental aspect of future games??
alina1380 [7]
I believe that the answer to the question provided above is that with the age of improving technology, the aspects of future games will be based more unto electronic games or e-games.
Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.
7 0
3 years ago
Read 2 more answers
Which skill type refers to the knowledge and ability to perform a task?
Thepotemich [5.8K]

Sound, Audio for engineering sound Quality's.

7 0
3 years ago
Read 2 more answers
Other questions:
  • A computer abuse technique called a ____ involves inserting unauthorized code in a program, which, when activated, may cause a d
    11·1 answer
  • What type of file can most software applications read?
    5·2 answers
  • Which of the following is considered information?
    6·2 answers
  • PLEASE HELP<br><br><br> i’m doing a internet safety brochure. what is a good hook ?!
    14·1 answer
  • Software that instructs the computer how to run applications and controls the display/keyboard is know as the
    8·1 answer
  • Advantage and disavantage of malware maintenance
    12·1 answer
  • Write a program that uses these bounds and bisection search (for more info check out the Wikipedia page on bisection search) to
    8·1 answer
  • Next, go to the mw_tour.html file. Within the document head, create links to the mw_layout.css and mw_styles.css style sheet fil
    10·1 answer
  • What happens when a computer gets a virus?
    6·2 answers
  • Which page in a web site do viewers usually see first?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!